<?xml version="1.0"?>
<?xml-stylesheet href="/transform" type="text/xsl"?>
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:bs="http://purl.org/ontology/bibo/status/" xmlns:ci="https://vocab.methodandstructure.com/content-inventory#" xmlns:dct="http://purl.org/dc/terms/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:xhv="http://www.w3.org/1999/xhtml/vocab#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" lang="en" prefix="bibo: http://purl.org/ontology/bibo/ bs: http://purl.org/ontology/bibo/status/ ci: https://vocab.methodandstructure.com/content-inventory# dct: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ rdf: http://www.w3.org/1999/02/22-rdf-syntax-ns# xhv: http://www.w3.org/1999/xhtml/vocab# xsd: http://www.w3.org/2001/XMLSchema#" vocab="http://www.w3.org/1999/xhtml/vocab#" xml:lang="en">
  <head>
    <title property="dct:title">No User-Serviceable Parts Inside</title>
    <base href="https://doriantaylor.com/no-user-serviceable-parts-inside"/>
    <link href="document-stats#EuKL8cUdcbvejlIcN-GbZK" rev="ci:document"/>
    <link href="elsewhere" rel="alternate bookmark" title="Elsewhere"/>
    <link href="this-site" rel="alternate index" title="This Site"/>
    <link href="http://purl.org/ontology/bibo/status/published" rel="bibo:status"/>
    <link href="" rel="ci:canonical" title="No User-Serviceable Parts Inside"/>
    <link href="lexicon/#EDk9p8qaqG0m6nxmFqAETK" rel="dct:audience" title="Digital Media Insider"/>
    <link href="person/dorian-taylor#me" rel="dct:creator" title="Dorian Taylor"/>
    <link href="//www.amazon.com/dp/0262631598" rel="dct:references"/>
    <link href="//www.amazon.com/dp/046502596X" rel="dct:references"/>
    <link href="//www.amazon.com/dp/0465066933" rel="dct:references"/>
    <link href="lexicon/#EOb-LCUnhJKXt1zxftkR1K" rel="dct:subject" title="Design Ethics"/>
    <link href="person/dorian-taylor" rel="meta" title="Who I Am"/>
    <link about="./" href="3f36c30c-6096-454a-8a22-c062100ae41f" rel="alternate" type="application/atom+xml"/>
    <link about="./" href="f07f5044-01bc-472d-9079-9b07771b731c" rel="alternate" type="application/atom+xml"/>
    <link about="./" href="this-site" rel="alternate"/>
    <link about="./" href="elsewhere" rel="alternate"/>
    <link about="./" href="e341ca62-0387-4cea-b69a-cdabc7656871" rel="alternate" type="application/atom+xml"/>
    <link about="verso/" href="3f36c30c-6096-454a-8a22-c062100ae41f" rel="alternate" type="application/atom+xml"/>
    <link about="verso/" href="this-site" rel="alternate"/>
    <link about="verso/" href="elsewhere" rel="alternate"/>
    <meta content="no-user-serviceable-parts-inside" datatype="xsd:token" property="ci:canonical-slug"/>
    <meta content="Our modernist obsession with concealing knowledge for petty selfish purposes has made it difficult to promulgate the concealment of knowledge in more important contexts." name="description" property="dct:abstract"/>
    <meta content="2013-10-20T23:57:57+00:00" datatype="xsd:dateTime" property="dct:created"/>
    <meta content="no-user-serviceable-parts-inside" property="dct:identifier"/>
    <meta content="2013-10-20T23:55:43+00:00" datatype="xsd:dateTime" property="dct:issued"/>
    <meta content="2013-10-30T17:34:20+00:00" datatype="xsd:dateTime" property="dct:modified"/>
    <meta content="2022-05-31T04:18:52+00:00" datatype="xsd:dateTime" property="dct:modified"/>
    <meta content="2022-05-31T15:10:50+00:00" datatype="xsd:dateTime" property="dct:modified"/>
    <meta about="person/dorian-taylor#me" content="Dorian Taylor" name="author" property="foaf:name"/>
    <meta content="summary" name="twitter:card"/>
    <meta content="@doriantaylor" name="twitter:site"/>
    <meta content="No User-Serviceable Parts Inside" name="twitter:title"/>
    <meta content="Our modernist obsession with concealing knowledge for petty selfish purposes has made it difficult to promulgate the concealment of knowledge in more important contexts." name="twitter:description"/>
    <object>
      <nav>
        <ul>
          <li>
            <a href="document-stats#EuKL8cUdcbvejlIcN-GbZK" rev="ci:document" typeof="qb:Observation">
              <span>urn:uuid:b8a2fc71-475c-46ef-a7a3-94870df866d9</span>
            </a>
          </li>
        </ul>
      </nav>
    </object>
  </head>
  <body about="" id="EFVoZeauY2pXpPwQtgZX-K" typeof="bibo:Article">
    <section id="E3BTUFkPQZK6y0GaRNOu-K">
      <p>If you look at <a href="http://www.steamengines.ca/" rel="dct:references">pictures of steam locomotives</a> from the 19th century, you'll notice something interesting: rather than being covered up, the moving parts are decorated, even exaggerated. <a href="http://www.singersewinginfo.co.uk/gallery_machines/" rel="dct:references">Sewing machines from this era</a> are another good example. <a href="http://www.antiquetypewriters.com/collection/index.asp" rel="dct:references">Early typewriters</a> likewise. The lacquer begins wherever the brass stops. Pistons and levers have details and decorations cast straight into them. The style was very much to embrace the technical implementation and embellish it, though granted at the time there wasn't a lot of technical detail to embellish.</p>
      <p>Beginning in the interwar period of the 20th century, the trend became to <a href="http://en.wikipedia.org/wiki/Streamliner" rel="dct:references">cover the machinery up</a>. First it was ostensibly for practical purposes in industrial and military applications, for instance to save money on fuel or steer the aircraft. The practice eventually mutated, as such practices do, into a marketing gimmick to sell chrome-plated living rooms on wheels.</p>
      <aside role="note" id="EL7KQMoY3NMpddQKr9YK5J">
        <p>If you ever get a chance to crack the hood on one of those finned behemoths, you'll note how small the engine&#x2014;still enormous by today's standards&#x2014;looks in contrast to the rest of the chassis, with gaping voids to the asphalt beneath. The guts of a contemporary iPad are also pretty impressive: the circuitry that actually does the work of being an iPad occupies a small corner of the device, and the rest is battery pack. A denuded Tesla is similar.</p>
      </aside>
      <p>In <a type="audio/mpeg" href="http://www.oopsla.org/podcasts/Keynote_FrederickBrooks.mp3" rel="dct:references">a lecture from 2007</a>, Fred Brooks advanced the notion that <q>there are no more na&#xEF;ve technologies left in the West.</q> Rather, they are now composite, second-order and higher abstractions from physical reality. As such it is now possible to have designers&#x2014;experts&#x2014;of all kinds, busy making products and services for other people to use, all the while possessing <em>no idea</em> how the medium they use every day actually works. I wonder in earnest how smart a practice that is.</p>
    </section>
    <section id="EmrrpZKaY57IbO8vy7PIUL">
      
      <h2>The Medium Will Always Win</h2>
      <p>When Sullivan wrote <a href="http://academics.triton.edu/faculty/fheitzman/tallofficebuilding.html" rel="dct:references"><q>form [ever] follows function</q></a> in 1896, he wasn't making a normative statement. It wasn't a pro tip to the modernists still in grade school to please not go overboard with the cladding. He was saying that if a thing has a certain behaviour, it can't help but come out looking a certain way. And I submit that <em>certain way</em> is an essential part of our relationship to artifacts in general&#x2014;something to bear in mind in an era when mimicry is the norm, when an object can look just about any way we want.</p>
      <aside role="note" id="EAvBXunHa7c4aolkxLQMmL">
        <p>If you want a feel for how such a basic transfer of embedded meaning can break down, try using any object made by Philippe Starck or Karim Rashid.</p>
      </aside>
      <p>The idea is that the physical reality of the medium, whatever it is, will always find a way to mess with your pristine design, no matter how much you try to spackle over it. Like a dandelion sprout piercing its way through a concrete sidewalk, the force is unstoppable. Best to take it into account.</p>
      <p>Seconds later in the aforementioned lecture, Brooks goaded: <q>how many of us can take a pile of sand and produce a computer?</q> I don't know if it's necessary for everybody to know how to do that, but it probably wouldn't hurt to know <em>that</em> computers are currently made out of sand, and a whole bunch of other things about them.</p>
    </section>
    <section id="EQIxFTcHIMExYkzNvs9ObJ">
      <h2>Leaving the Details to the Help</h2>
      <p>As somebody who has little to no moral difficulty <a href="i-am-in-a-book" title="I Am In a Book" rel="dct:references">learning a new skill</a> as a <a href="post-geek" title="Post-Geek" rel="dct:references">means to an end</a>, I'm often puzzled by what I detect to be almost be a pride in technical ignorance, an almost Victorian aesthetic that not getting one's hands dirty, and thus not needing to know how things work, is a sign of <a href="basic-input-output-system" title="Basic Input-Output System" rel="dct:references">elevated social status</a>. The clich&#xE9;d example involves, of course, one of the most significant inventions of the modern era: the automobile. The line goes something like <q>I don't have to know how it works. I just get in and go.</q></p>
      <p>The problem with that reasoning is that you <em>do</em> have to know a few fundamental things about how a car works, <span class="parenthesis" title="Which, if Google gets its way, you won't have to know how to do either.">aside from how to drive it</span>. You have to have just enough of a working theory of certain aspects of its implementation if for no other reason than to know when to take it to a mechanic. You have to know that it takes gas, and not Diesel&#x2014;or vice versa. You have to know that the tires need air and that the radiator needs water. You have to know that you have to turn the engine on before you can go anywhere. It's just that the car has been part of our culture for over a century, so we take these details for granted.</p>
      <aside role="note" id="E34pcH7S413MsgS80p4kWK">
        <p>The switch to electric power is notable because of what it takes away: there are numerous cases of pedestrians being hit by a Toyota Prius because they're expecting to hear engine noise. In a similar vein, the role of the <q>ignition</q>&#x2014;there is no fuel to ignite&#x2014;has commuted to a safety function, because with an electric motor, you otherwise literally <em>could</em> just get in and go.</p>
      </aside>
    </section>
    <section id="ET2KRvz-ghh2s8TZ8Tv3aK">
      <h2>Painted Into a Corner</h2>
      <p>All these decades of hiding the details have altered cultural expectations, even among designers, who, just like every other specialist, is a layperson outside his or her own narrow domain of expertise. But the meta-medium of electronic, digital information technology transcends these classical domains to such an extent that it is a mistake to put it in the same category.</p>
      <p>Take a hard problem, like the <acronym title="User Experience">UX</acronym> of cryptography. There is a lot of clamour these days, in the wake of revelations of head-smackingly obvious&#x2014;that is, if you understood how any of this stuff worked&#x2014;mass government surveillance, for more usable means of communicating with the assurance that nobody was eavesdropping. The underlying problem, I submit, is that in order to use cryptography effectively, you have to understand some fundamental things about the way information works. Okay? Forget computers. The usability problem of crypto would persist whether you were using a computer or not. Then you pile on seven decades of technical expedients, conceived in dimly-lit back offices, and you get the mess we're in today.</p>
      <p>The challenge is analogous to when you're driving and the fuel light comes on: as a user, you have to understand what certain events during the use of a system, <em>stemming from its physical reality</em>, mean. For designers to glaze over those details because they don't understand them is like erasing the lid to get at the gas cap from the blueprint because you didn't like the way it looked, and not mentioning that little factoid to the customer: to refuel, you have to bring your car to a service station where they <span class="parenthesis" title="you actually have to do this to change the oil on a Lamborghini, though I wager the car costs more than the crane. Fun fact: you could buy a new Kia for what it costs to lube a Lamborghini.">remove the body with a crane</span> that only specialists have access to, because it costs more than the car. Meanwhile the customer is stopped dead in the middle of the highway, wondering what happened, because he was told all he has to know is <q>get in and go</q>. Ah, but look at the sleek, uninterrupted lines.</p>
    </section>
    <section id="E4dpIQs3YdMtJJvX3mmswL">
      
      <h2>They Have to Learn on Their Own</h2>
      <p>Consider a specific <acronym title="User Experience">UX</acronym>-of-crypto problem like key verification. The user emphatically <em>cannot</em> maintain a complete ignorance of how the system works in no fewer than two places: First, that the key must be verified through a communication channel <em>other than the one you are using</em>, lest it be tampered with. Second, the key you are presented with <em>must match every time</em> with the one you obtained through that other channel, or the current channel <em>is</em> compromised&#x2014;and <em>then</em> what do you do?</p>
      <aside role="note" id="ERtblmGq56H0Sde88eHwML">
        <p>For the extra-paranoid: you also have to understand that the second communication channel has to be difficult to intercept, at least for long enough to verify the key. All of this understanding is overarched by the fundamental concept that it doesn't matter if you're communicating privately if you can't be sure who you're talking to.</p>
        <p>Some might argue that the user doesn't have to know about any of this key verification business if we delegate it to trusted authorties, through public key infrastructure like X.509, which is currently a part of what keeps your credit card number from being stolen when you buy things from Amazon. The second channel in this case is that through which your computer or device was shipped, with the authorities' certificates embedded in its operating system. But X.509 is spectacularly complex, and all it can really assert is that <em>somebody</em> paid to have this or that domain name associated with a cryptographic signature. Well, you can beat that with a cert you bought with a stolen credit card, sitting in a coffee shop and forcing everybody's traffic through your laptop. Or you could be the NSA and simply command Verisign to sign your dirty keys and do the same basic thing, just with the internet backbone routers instead of the Starbucks wi-fi.</p>
        <p>Moreover, just about every other week there is a new demonstration on how to fool X.509, which is to say nothing of the hyperbolic false positives due to benign misconfigurations or the extortion tactic of certificate expiry, which undoubtedly happen millions of times a day.</p>
        <p>That big scary modal dialogue box that pops up in front of your web browser and screams <strong>OMG UR COMPUTAR IS BEIGN HAX0R3D!!!11</strong> when it almost certainly isn't. That.</p>
        <p>Oh, and if you're thinking of using meatspace interaction to bootstrap a web of trust that you can continue extending digitally, consider how easy it is for bots to infiltrate Facebook networks. Just make the avatar a picture of a moderately attractive woman. Cinch.</p>
      </aside>
      <p>This is a process that you can't do for somebody, they have to do it themselves. A turn-key solution is impossible because the outcome of the process is meaningless if you, as an intermediary, completely envelop it. You can't just do it for them, because the integrity of the system relies specifically on them <em>not</em> needing to trust you.</p>
    </section>
    <section id="EK47yceJb-V-8stD9zzgDL">
      <h2>Technocrat's Gambit</h2>
      <p>In an ironic twist, the hyper-specialized, <a href="beat" title="Beat" rel="dct:references">let-me-get-that-for-you service economy</a> we've developed over the bulk of the last century, is impeding directly on our ability to solve a problem which is fundamentally couched in observing&#x2014;and subsequently interpreting&#x2014;phenomena <em>yourself</em> and taking nobody else's word for it. That really is what crypto is about: trusting nothing but your own senses because <em>anybody</em> in the chain between you and your compatriot could be in cahoots with the enemy.</p>
      <aside role="note" id="Eb1kIu3Y1DISadX4Mosp8I">
        <p>I mean <em>enemy</em> here as any entity you don't want peering over your shoulder. It's worth noting that cryptographically-secured communication can only really carry on in relatively free societies, since agents of a more repressive regime could just observe <em>that</em> you're communicating clandestinely, throw you in a panel van, and simply <a href="http://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis" rel="dct:references">beat your secrets out of you</a>.</p>
      </aside>
      <p>How we present scenarios like key verification to users is an information design problem, and <a href="key-continuity-for-kindergarteners" title="Key Continuity for Kindergarteners" rel="dct:references">we can do our best</a> to make that process amenable to the stengths of human perception and cognition. But in order to make that design successful, people are going to have to understand what they are looking at, and they are going to have to <em>care</em>. They have to care enough to understand, and they have to understand enough to care. The designers of those processes, unfortunately, don't care to understand, because those details are the purview of the engineers. The engineers might care, but with something like cryptography, often not enough to understand either.</p>
      <p>But then, we still live in a world where passwords are stuck to monitors with Post-It notes. Hell, we still live in a world with <em>passwords</em>.</p>
      <aside role="note" id="EvMZsKyoJmy4G0eEwVWoKK">
        <p>Ask me about alternatives! <a href="http://www.w3.org/wiki/WebID" rel="dct:references">There are plenty</a>, many of which are not nearly as boneheaded as a damn fingerprint scanner.</p>
      </aside>
    </section>
    <section id="Eo7OqhRPkOg5-wnwoWvQqL">
      <h2>Be Prepared To Be Good Neighbours</h2>
      <p>My long bet for the future of society as a whole is that we <a href="moving-society-past-information-hegemony" title="Moving Society Past Information Hegemony" rel="dct:references">won't be able to sustain this strict orthogonality</a> of expertise that we currently observe. We simply won't be able to say <q>that's not my department</q>, especially in so-called <q>tech</q>, which, as I mentioned, notwithstanding the business of manufacturing its own equipment, is more of an <em>aspect</em> of <em>all</em> domains of specialist knowledge than a domain in its own right. When it colludes with the silos that precede it, <q>tech</q> vastly amplifies the range of exploitative behaviour those silos perform as a matter of course, and turns the potential for abuse from a retail-level affair into a wholesale one. In order to adapt, everybody is going to have to know just a <em>little</em> bit about everybody else's business, lest some tireless, automated system suck them dry.</p>
      <p>We really are <q>imploding</q>, <a href="http://www.amazon.com/dp/0262631598?tag=doriantaylor-20">as McLuhan wrote</a>, into a global village, where everybody has to know <em>something</em> about everybody else's business, if for no other reason than to to be able to call them out on their bullshit. That, incidentally, is the proximate, practical motivation for a user experience designer to <a href="http://www.amazon.com/dp/046502596X?tag=doriantaylor-20">understand how computers work</a> as a medium. The deeper, subtler reason is that it will make you a better designer, equipped to solve problems which are more meaningful to society than the best new way to share funny cat pictures or whatever.</p>
    </section>
  </body>
</html>
