Motorola Adopting 3 Laws of Robotics For Android? 178
jfruhlinger writes "Android's popularity is growing, but its lack of enterprise security features is making IT departments pull their hair out. Two of the biggest Android vendors, Motorola and Samsung, aren't waiting for Google, but are building their own security functionality into the devices they sell. Motorola's version will be facilitated by their purchase of 3LM, an Android-centric mobile security provider that bases their strategy on Asimov's Three Laws or Robotics, though the order is tweaked: The device must protect the user, protect itself, and obey the user, in that order."
"building in security" (Score:3)
Well, it was fun while it lasted. The 'peoples' phone: RIP. 2011
Comment removed (Score:5, Insightful)
Re:"building in security" (Score:5, Funny)
I would prefer that if I so ask it, the device will obey me even at my peril or its own.
Sometimes human beings have to die, just a little, for something really spectacular to happen.
Zeroth Law (Score:2)
I would prefer that if I so ask it, the device will obey me even at my peril or its own.
If they are really true to Asimov's laws they'll also need to implement the zeroth law which was to protect humanity from harm even if that meant not protecting one or more humans from harm. Preventing users trying new innovative and sometimes crazy ideas with their hardware is arguably harmful to humanity as a whole. However it is also possibly harmful to their bottom line so I expect this one of the laws will get conveniently forgotten.
Re: (Score:2)
If they are really true to Asimov's laws they'll also need to implement the zeroth law which was to protect humanity from harm even if that meant not protecting one or more humans from harm.
I'm sorry Dave. I'm afraid I can't do that.
Re: (Score:2)
I don't remember a "zeroth law" in the book.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
No, I read the book.
Re: (Score:2)
I'm assuming that rooting, tethering and other unauthorised usage are going to to feature on the list of things that the phone needs to 'protect itself' from.
As this is about business users, what do you expect? If you're given a company car you aren't generally allowed to install a tuned race engine, open pipes and a one zillion watt sound system taking up the back seats and boot.
Re: (Score:2, Interesting)
Re: (Score:2)
The phone self-destructs when it detects copyright infringement?
Re: (Score:3)
DON'T GIVE THEM IDEAS!
Re: (Score:2)
Re: (Score:3)
As an IT security person, I applaud Motorola's initiative. As soon as I see it hitting the market, I will review and probably start recommending it to my customers.
As the owner of a rooted Motorola Android phone, my next one will probably from a different brand.
The main reason I rooted my phone was to use OpenVPN on it. Which is a security tool.
I wonder if that level of irony can be unhealthy...
Re: (Score:2)
Well that level of irony can be unhealthy for your company's checkbook.
Now users will be in a position to demand a company phone for company work rather than just using their own.
That's fine if your company is willing to pay the expense.
Re: (Score:2)
Company phone is not any more unusual than company notebook these days, specially for people who need external access to the network.
Actually, for many cases, I can see the old desktop+notebook combo being replaced by desktop+smartphone. I've have heard often enough about people asking for a notebook for use during meetings and presentations. I for one stopped doing that and only use my phone these days. 99% of the time my notebook is sitting quietly in my desk (besides my desktop).
Re: (Score:2)
Re: (Score:2)
User Asks: (Score:2)
Can I eat the device's battery?
Logic bombed.
Re: (Score:2)
Goddamnit I need to hide the power cord to the computer when I take my drugs =(
The three laws are intentionally wrong (Score:4, Insightful)
... to allow for an interesting development of a series of stories that culminate in unexpected consequences. have a read, and then ask yourself what the bugs are in the restatement.
Hint: the bug is now the highest priority.
--dave
Re: (Score:2)
Even as a kid I thought these three laws were a bit goofy and were clearly just a plot device. As an adult engineer I see that these are really just the "three design requirements of robotics".
Not so (Score:4, Insightful)
The laws are not "intentionally wrong". In fact, as Asimov himself pointed out, the three laws are basically common sense for any tool. It should have safeguards to protect the user, it should accomplish what the user wants, and it should be durable. Most machinery has interlocks (first law), can be tinkered with (second law), and shouldn't smash itself to bits unless the user screws up (third law).
In fact, the laws are so reasonable and obvious that they needed to be twisted into bizarre contortions (e.g. Runaround), flat out ignored (e.g. Little Lost Robot), or overridden with the Zeroeth Law , in order to achieve most of Asimov's best stories.
Re: (Score:2)
There are many flaws with the three laws.
What happens when a robot thinks the owners life would be 'harmed'* if the owner tinkers with it?
*what does that mean? is there an extent? This si the real flaw, many words are up to interpetation. Sure, the extreme are easy but the middle ground is where most of use live.
Re: (Score:2)
they were intelligent machines with 'souls', that's why they needed a moral code in order to have motivation to do anything and to limit what they could be used for. if they had no notion of self, they wouldn't need that rule to begin with.
many of the stories are thought experiments that hadn't been written down so well before that and about the flaws of definitions of such things as what's good for you, the same kind of stories could have been run with magical eunuchs, golems or such before(just replace ro
The Zeroth Law (Score:5, Informative)
Re: (Score:2)
Judge: Corporation, you're liquidated!
[zeroth law vanishes]
Android: Thank you.
Re: (Score:2)
The fourth directive (Score:2)
Re: (Score:3)
Re: (Score:2)
1. Serve the public trust 2. Protect the innocent 3. Uphold the law 4. ...PROFIT!
Fixed that for you...
Actually (Score:2)
Re: (Score:2)
Asimov's "zeroth law" was to " protect humanity -
but regardless of that the " thress laws" are already perverted here in order to "protect the corporation".
Asimov's 3 lawas where : Protect humans; 2) OBEY humans; 3) Protectself.
"Protect self" here is a cheap excuse for DRM - protecting the corp. and harming humans.
Re-ordering the laws is just an Orwelian sadistic twist.
Wrong order. (Score:5, Insightful)
I love my Android but, its no surprise that the maker would prioritize protection above obedience. I would change the order:
1. Obey the authorized user (esp since he is normally the OWNER)
2. Protect the authorized user.
3. Protect itself.
Different orders can be considered when they become self aware. Until then, its a tool damnit. My hammer doesn't try to protect me, nor would I want it to. A safety on a gun may "protect me" but, the device definitely obeys before protects, because all the user needs to do is turn off the safety, and all protection is gone.
As the user/owner of a non-self aware device, it should obey me, even if my intention is to use it to destroy itself, or others.
Re: (Score:3)
As the user/owner of a non-self aware device, it should obey me, even if my intention is to use it to destroy itself, or others.
The problem is that this is the situation we already have. Our machines obey us, even if we have been socially engineered to instruct our machines to perform tasks that are malicious. A zombie PC damages itself, its owner, other machines, and their owners.
This application of the mythical "Three Laws" seems designed to protect us from ourselves.
Now, this is going to annoy the livi
Re: (Score:2)
This application of the mythical "Three Laws" seems designed to protect us from ourselves.
The idea that we must create machines to protect us from ourselves is both morally repugnant and logically consistent. Every tool we create is designed to correct some inadequacy of humans, whether it is our inability to crack coconuts, smelt steel, or transmit information without assistance. Making a machine to confer sound judgment onto otherwise clueless people is a logical extension of that, which is why the Three Laws (in original form or others) are at once compelling fiction and impending reality.
Re: (Score:2)
As the user/owner of a non-self aware device, it should obey me, even if my intention is to use it to destroy itself, or others.
The problem is that this is the situation we already have. Our machines obey us,
No they don't. My phone doesn't obey me, it obeys its manufacturer (Motorola). And that sucks, because Motorola doesn't care about it. And because it doesn't obey me, I can't get it to update to a somewhat recent version of Android.
Re: (Score:2)
Well, when speaking about Murphy, it's obvious that you have to make mistakes ... even if the Murphy you speak of isn't the one of Murphy's Law.
Re: (Score:2)
I would change the order:
1. Obey the authorized user (esp since he is normally the OWNER)
2. Protect the authorized user.
3. Protect itself.
I would change it slightly differently:
1. Obey the authorized user if, after (non-verbosely but with option of expanded explanation) warning him of issues with laws 2 or 3, he says he really means it.
2. Protect the authorized user.
3. Protect itself.
4. Obey the authorized user.
Re: (Score:3)
I would change the order:
1. Obey the authorized user (esp since he is normally the OWNER)
2. Protect the authorized user.
3. Protect itself.
I would change it slightly differently:
1. Obey the authorized user if, after (non-verbosely but with option of expanded explanation) warning him of issues with laws 2 or 3, he says he really means it.
2. Protect the authorized user.
3. Protect itself.
4. Obey the authorized user.*
*Only if said action occurs on a device without an active cellular network connection or with a cell network where the action does not potentially harm the network or any other users of the network.
Re: (Score:2)
Re: (Score:2)
The whole point is they will not be able to install a custom rom. Look at the droid X it still cannot boot a custom kernel, it must kexec into one.
This is motorola extending that.
Re: (Score:2)
It's not always the users fault, but if they download and click on NataliePortmanHotGritsXXX.jpeg.exe and the device obeys them, there's only so much that can be done.
Here's the question that doesn't get asked nearly often enough: Why should running an .exe automatically hand over complete control of the device to it on a silver platter?
The ability to run programs with limited privileges has existed in microcomputers since 1982. (Yes, the Intel 80286 with "protected mode".) But OS programmers have completel
Re: (Score:2)
1. android binaries are not called .exe
2. android has permissions limitiations, when an app is installed you have to ok the permissions is it going to get. What needs to be added is the ability to still run the app with only some of the permissions approved. This would however mean that ad supported apps would be useless as the user would never allow them to access the network.
Re: (Score:2)
Re: (Score:2)
Android also has a VM, where even if there was a flaw in the OS that would allow something to get root, it would have to get out of the VM. Since the Dalvik VM is constantly updated by Google, with bugs fixed quite quickly, it would take an attacker a significant time to find a hole to get out of the VM.
After getting out of the VM and able to execute Linux system calls directly, there is getting out of the user mode. This can be trivial, or it can be quite difficult, depending on device.
Because Android ha
Re: (Score:2)
While there is a place for advanced tools for advanced users, the majority of users aren't advan
Unfortunately, you are incorrect (Score:3)
I hate to bust your bubble, but saying "1. Obey the authorized user (esp since he is normally the OWNER)" is wrong for security. This is about security.
The fact of the matter is that social engineering is far simpler than hacking in almost all circumstances. And people are ***EXCEEDINGLY*** careless with their mobile phones. How many people don't have their PC, which sits in their locked house, remember forms data/passwords, but have a stupid app on their phone that shoots straight to all of their email
New Security Paradigm (Score:4, Insightful)
I hate to bust your bubble, but saying "1. Obey the authorized user (esp since he is normally the OWNER)" is wrong for security. This is about security.
Rather that the "you cannot do that" security paradigm how about trying a new one: "the easiest way to do something should be a secure way to do it"? The problem with the "you cannot do that" paradigm is that invariably you can actually do it with enough hacking, which is rarely secure, and once that happens the method to do it spreads because lots of people want it.
Re: (Score:3)
Bingo. To take an example from physical security, if the door to my house refused to let me into the house if it believed I was likely to damage the house (which it might think I would if I were blind drunk), then when I go out, I'll leave the door propped open so it can't lock me out.
A security tool that is too hard to use gets ignored. Tools that try to second-guess their users are hard to use.
Re: (Score:2)
why sell power user devices to people you'd regard as low iq users?
well, that's not what motorola actually wants, it wants to sell the devices in big bulk number to operator and then have that operator basically rent/finance the phones to the phone users, that is USERS, not owners.
however every time a mobile related company has brought in tech to protect the user, it has always been about making the user not able to send forward software(files) from the phone. for drm and operator sales ambitions.
Re: (Score:2)
Different orders can be considered when they become self aware. Until then, its a tool damnit. My hammer doesn't try to protect me, nor would I want it to.
But many tools do try to protect you.
Which is why industrial and craft workers in the 21st Century tend to keep all their fingers and toes.
As the user/owner of a non-self aware device, it should obey me, even if my intention is to use it to destroy itself, or others.
Those in harm's way are free to disagree.
It may be because I was raised in an environment where the phone, the car, the truck, the electricity and the tractor had to work - and work for everyone, all the time, an environment where death was never very far away.
But something permanently soured me on the notion that the phone is a toy and the network my personal pla
Re: (Score:2)
I would submit that there is a big difference between being designed for safe operation to protect the user from an accident, and preventing the user from making a decision.
My circular saw has a guard that gets pushed back as it glides over the cutting surface, and snaps back when it finishes. This prevents all sorts of errors and injures that could occur accidentally.
That same saw, has a handle on the guard, such that I can grab it with my hand and pull it out of the way, should I decide that, in this situ
Re: (Score:3)
Bullshit, this is FUD by the telecoms. You cannot do anything other than use normal cellular functions. Android does not even control the radio directly. Stop spreading this crap.
Re: (Score:2)
Parent is right. Modern phones prevent you from doing anything that could harm the network at the firmware level - which is just fine IMO, I don't want it to be easy to turn a cell phone into a cellular jammer.
Re: (Score:3)
Don't worry (Score:2)
I'm sorry, Dave (Score:2)
In that order? Really? So, if you try to upgrade your phone, your existing phone will (in accordance with "protect itself") attempt to sabotage your purchase? "I'm sorry, Dave. I can't let you do that."
Re: (Score:2)
Exactly. That's what Motorola phones do. You can't upgrade their OS. Only Motorola can.
3 laws o Robotics sounds like the 99^99 laws of US (Score:3, Insightful)
Protect itself: Self explanitory
Obey the user except when the user wants to do something that can cause harm to the user.
Re: (Score:3)
Obey the user except when the user wants to do something...
Fixed that for you.
Re: (Score:2)
funny you mention drugs. motorola does piss tests on ALL employees (even contractors!).
when a division of motorola was being sold (several months ago) they forced ALL employees to go do a piss test, right then and there. no one was allowed to refuse - this was AFTER people were already hired, there and in their jobs for months or even years.
pretty evil corp. no individual freedoms on your own time. they own your ass.
its not just the evil DRM they build in; but the company is pretty evil down to the core
Laws in wrong order on purpose? (Score:2)
Was not one of the inherit flaws with the Three Laws, that it brings up the issue of whether robots are treated as thinking tools or mechanical people?
Maybe it's hard to personify a 4-inch rectangle of glass and plastic, but at a certain point could we be asking an intelligent being (of circuits) to sacrifice itself at our whims of hackery? Could bricking a device be considered murder?
Clearly, Motorola is on the forefront of robot rights.
Re:Laws in wrong order on purpose? (Score:4, Funny)
I have always followed a rule for programming or hardware chicanery:
If it asks me to stop, I stop.
So far, so good.
Re: (Score:2)
The Three Laws stories, as I recall, explored interactions between the "three laws" themselves, and situations where obeying them led to contradictions. In particular, the R. Daneel Olivar stories questioned, "how do you determine whether a person is a (sufficiently advanced) robot following these directives, or simply a Good human being.
The question "is bricking a device considered murder", it brings many of the other staples of AI science fiction: if you activate a backup of an AI, is it a separate being
Stupid (Score:4, Insightful)
Everybody remembers the famous 3 Laws of Robotics.
Nobody seems to remember that the stories were about how they failed over and over due to unintended consequences and and loopholes, for example robots are able to break them if they don't know they're doing so.
Re: (Score:3, Funny)
User: (tries to call his girl friend)
Phone: I can't let you call this number. I'm designed to keep damage from you. My integrated medical devices noticed changes in your cardiovascular system when you call this number. Your pulse and blood pressure increase. High blood pressure is a well known risk factor for heart deceases and apoplectic stroke. I have to conclude that calling this number cannot be good for your health.
Waiting for Google (Score:2)
I know where this is going... (Score:2)
if (protect the user obey user) // segfault?
return -1;
Yep, we're doomed :)
Actually, until Android's are solar/nuclear powered, there's nothing to worry (cringes).
OCP (Score:2)
Another fine product by Omni Consumer Products.
I'd buy that for a dollar
Protect the User? (Score:2)
This from the company who encumbers Android with Blur? Keeping the user's social network username and password on and accessing said services Moto's servers instead of from the phone itself is not what I consider "protecting the user."
I love my Droid, but I will not be buying another Moto Android phone if they keep loading it up with Blur and locking down the bootloader.
AMEN! (Score:2)
the 4th law is classified (Score:2)
Re: (Score:2)
they get this:
http://www.youtube.com/watch?v=00EjPKPSAAE [youtube.com]
Its just corporate double speak (Score:2)
As the blurb says, this is about "Enterprise security features". Ergo, this is not about protecting the user. It is about protecting the corporation that gave the user the phone.
Their three laws are just the usual sugar coated spin to help the medicine go down. To make that obvious just re-word the law with enterprise substituted appropriately: The device must protect the enterprise, protect itself, and obey the user, in that order. And of course it should. Presumably the enterprise is paying for the p
Life imitates Asimov? (Score:2)
Am I the only one that read those books? (Score:2)
the three laws where flawed. It's the damn reason there is a story in the books. Stop using them, and stop thinking they solve any real problems.
gah.
*4* laws (Score:2)
Don't forget the MOST important one:
0) An Android Phone may not, through action or inaction, harm Motoroloa Mobility Corporation's bottom line
I'm pretty sure they'll substitute "consumer" for "human" in the other laws, too.
Not that "MOTOBLUR" and the use-prevention chips that Motorola has been using to lock down and effectively retain partial ownership of their customer's devices has given me a cynical opinion of Motorola (and other similar companies) or anything...
Re: (Score:2)
an Android-centric mobile security provider that bases their strategy on Asimov's Three Laws or Robotics, though the order is tweaked: The device must protect the user, protect itself, and obey the user, in that order
Re: (Score:2)
And of course "protect itself" translates to "obey its manufacturer". So it's never really going to be the user's device. I think Asimov had good reason to put his laws in that particular order.
Re: (Score:2)
Note to self: Mod-up parent when I get mod points.
Re: (Score:2)
They are all consumer phones with nothing serious for business use. Motorola and Samsung are crying because the corporate world doesn't want to keep it's calendars and contacts on Googles servers. They've made their bed now they can lie in it. They will have to diverge significantly from the Google kool-aid in order to implement anything workable for business. Android phone users are consumers just like Apple phone users are. You must be new here, if you think this post is more biased than any other pos
Re: (Score:2)
Both iPhone and Android have activesync support on the handsets. They are used in business, and are replacing BES devices. I say are because we have replaced about 20 devices in the last year.
Re:Bias (Score:4, Informative)
I don't get it: everyone bashed Apple when its iPhone lacked certain features (multitasking, cut and paste, enterprise security) but not one peep when Android or Windows Mobile lacks these very same features.
What? Android *does* have excellent multitasking, as well as decent cut and paste. I'm not sure about enterprise security, but I think people have blasted Android for not having it, if it doesn't.
What the fuck are you talking about?
Re: (Score:3)
What is funny is that the Exchange security has been addressed by a solid Android app: Touchdown. This app encrypts all data, even files present on the SD card, supports remote wipe, enforces Exchange's permissions, and does what enterprises need for enforcing security.
There is only one item missing from Android, and that is device encryption, and encrypting data (not just the .apk stuff) on the SD card.
Google can easily address this -- LUKS or EncFS for the SD card, store the key in /etc, perms 066.
Re: (Score:2)
Re: (Score:2)
I beg to differ. The iPhone at launch had a lot of good items, but it didn't have in iOS 1.0:
1: Cut and paste. This didn't come until 3.x. (IIRC)
2: Third party apps.
3: Device encryption.
4: More than token Exchange support.
Android came with a bunch of things, and the improvements were more incremental than anything else. Of course, Android did not have Exchange support, but third party companies (NitroDesk and DataViz come to mind) promptly addressed that.
Neither phone OS was shipped perfect. Both a
Re: (Score:2)
I don't get it: everyone bashed Apple when its iPhone lacked certain features (multitasking, cut and paste, enterprise security) but not one peep when Android or Windows Mobile lacks these very same features.
I get your point, although Android doesn't fit it as well as Windows Phone 7 does.
I saw the Windows Phone get blasted for these exact points on several fronts. If you didn't notice it on Slashdot, it's likely because the reasoned critics were drowned in the sea of rabid anti-everything Microsoft blather that makes up such a large chunk of posts here. Note that, depending on topic, you could replace "Microsoft" with "Apple" and have it be equally true.
Android does seem to get a free pass on a lot of items, t
Re: (Score:2)
The problem with WP7 is that it "too little, too late". Instead, Microsoft should have seen about virtual machine technology so people could run most WP6.5 and earlier programs (technically not apps because they have been present before the word "apps" came into use), and direct access for XNA and Silverlight programs.
With the ability to use older programs in a VM, or perhaps different VMs, Microsoft would have the best of two worlds: An installed base that dates over a decade, and a new platform with goo
Re: (Score:2)
That's because Android has been blessed by the Church of Open Source. It isn't held to the same standards. It's a religious thing, you know. ;-)
No, it's a practical thing. With Open Source, if one of the clouds is missing from paradise you can add it. Or wait until some team of team of fanatics in their monastery do so and then import a copy.
Re: (Score:2)
Except when you own a Motorola device, obviously. Then the fixed code is no good to you unless Motorola blesses it. Which they won't.
Re: (Score:3)
This order sounds right.
For those of us who know what we're doing, sure this is offensive.
For those who decide that spending 99cents on Justin Bieber wall papers that also snoop on their private conversations, that's a different story.
See, no vision, this is the problem in america. If you really want to snoop people's private conversation, you make the wallpaper free!
Re: (Score:2)
It's bizarre. By charging more money you can sometimes reach a larger audience.
No, it's bazaar.
Re: (Score:2)
Because malware could not make it into their walled garden?
Bullshit, these are the same folks that have had many apps get through claiming to be one thing but doing another. Like the camera app they pulled because it used a physical button. They also failed to catch the flashlight app that allowed tethering. These folks might have a walled garden, but they fail pretty bad at guarding it.
Re: (Score:2)
Wow! This must be a new record! I almost made it all the way to the bottom of a Slashdot thread--just barely there--before an Android-centric discussion turned into an anti-Apple thrashing.
For a second there I forgot where I was. Thanks for bringing me back.
-dZ.
Re: (Score:2)
With everyone rooting their phone, and people actively looking for open flaws to let you root the phone - not to mention every update closes the root hole...
I'd say that its less secure because the user makes it that way.
Of course, I can make my android 100% secure by never running anything on it.
Re: (Score:2)
Except, you know, if you read the summary, it's not your phone; it is your employer's phone.
Re: (Score:2)
If I want to "damage" my phone I don't want anyone trying to stop me. Remind me not to buy Motorola again...
Don't buy Motorola again...