Fully agree - such a great movie: absolutely flowing, entertaining, fantastic characters, nice colors.
That together with "Three days of the Condor" is what I immediately though of when I heard the news, but so far only one of the newspapers/sites I read has mentioned both of them..., weird :o|
Am I just getting too old (respectively, are articles being written by too junior people?)?
> I would presume Google still has all this data. ...
Maybe - I guess that they must have served that "cached" content from DB-records that had it all saved directly (URL X has contents Y => basically a "mirror" of the terms that they indexed) => not having to store that "mirror" (only the search index) might save quite a lot of storage space (and I/O and CPU to decompress it, as users won't be requesting it anymore) => all in all that might save quite a lot of infrastructure costs $$$.
> Could this be an advantage that Google can use to train their models on but others won't have access?
Maybe (if they decided to just get rid of the I/O related to the user requests), but on the other hand I don't know if previously any "Google-consumer" was ever able to perform mass-downloads of Google's "cached" data - could that be done without being banned by Google's webpage (or API)?
I fully agree with you & upstream - on the other hand there are specific (~local) shops which I use often and I'm 99% sure that I would not need the Credit Card (CC) protection with them, so having a CC-alternative for those cases is nice.
> On the beta launch date, Object Storage will be available in Falkenstein (fsn1) only. We plan to add Nuremberg (nbg1) next. After the beta test, Object Storage will be available in all our European locations.
Is something like this unexpected? I personally never ever thought so (which is the reason why I never ever even considered running a TOR exit node).
As much as I can respect the idealism about privacy and liberty etc..., I could not ignore the fact that any "really!!!" bad actor could use the same infrastructure to avoid investigation/prosecution, therefore I did not want to provide indirectly any help.
> I feel law enforcement realizes this is a big weakness they can target since a lot of Tor exit operators are individuals with not a lot of resources to fight them. They can use the legal system to scare operators into shutting down.
On one hand I admit that that might be the case, on the other hand even government organizations/departments/agencies can be "local" and scattered (e.g. similar IT departments for each "canton" in Switzerland) and not have huge amounts of resources/knowledge to track/identify perpetrators of all ongoing (sophisticated?) IT crimes => somebody somewhere might see the same IP involved in a lot of "bad" stuff not realizing it's just a TOR node.
I hate the current general trend pushing a position of an either absolute "yes/no" for any theme, including this one (of encryption for privacy/etc vs. crime).
In my opinion it's obvious that the current situation of solutions is in general bad: too much pressure on services that provide privacy because it's too easy for crime to misuse them :o(
> As much as I can respect the idealism about privacy and liberty etc..., I could not ignore the fact that any "really!!!" bad actor could use the same infrastructure to avoid investigation/prosecution, therefore I did not want to provide indirectly any help.
Well, what would be considered a "really!!!" bad actor for some might be a hero for others. Just as an example, depending on which side of the Israel/Palestine conflict you are on, either side using your node for military intelligence might be an use worth fighting for or terrible abuse.
In the end, this really comes down to whether you value freedom or state protection more; either of which can be abused by rogue actors or a malicious state, respectively. There is no win-win-solution, unfortunately.
During The Troubles bombs were sent via the Royal Mail. Nobody blamed the post office. Indeed any infrastructure is a tool of terrorism as we rely on it (I am not going to make a list for obvious reasons). I think the reason we tolerate this problem with infrastructure is that the benefits outweigh the risk. The question is whether or not the same applies to free speech - you're right there is no win-win solution, but it still might be worth it.
However if you start "Peters no questions asked hand delivery service, shipping direct from Ireland to London so reliably you can set a timer by it" - and you deliver 3 bombs to politicians you might find yourself being asked a few questions.
At the time that's exactly what the Royal Mail was. Requiring identification to send packages is a much more recent development. Society just accepted that bad actors could do this and solved the root problem instead.
There are quite a bit of differences here. The mail services transport physical goods, and the whole path can be tracked. Every letter or parcel is registered by the postal office where it was submitted to for transport. And usually there is quite some physical evidence with everything you do mail.
> I think the reason we tolerate this problem with infrastructure is that the benefits outweigh the risk.
The thing is, we absolutely don't tolerate this with infrastructure. We have entire systems in place to make sure that we can find people who use our infrastructure to kill people. The USPS has its own entire law enforcement branch whose sole job is to track down people who misuse the mail. I'm sure there are processes in the UK for the same.
With our infrastructure there's some non-zero amount of abuse that we acknowledge we won't be able to prevent in order to make everything work without infinite enforcement cost, but we don't just close our eyes to the abuse and not even try to do anything about it at all.
The difference between the post office and Tor is that Tor is very specifically designed to make tracking a sender of a bomb threat impossible. State-run postal services at least try to have an audit trail for what they send.
> depending on which side of the Israel/Palestine conflict you are on
Here's the thing: I am not on either side of that conflict, or likely any other conflict you could use as an example. There are atrocities committed by both sides. There are victims on both sides. You could argue over who committed the worse atrocities or over who is the biggest victim until your face turns blue, it isn't going to end the cycle of violence as long as there are people facilitating that violence.
And no, I am not naive. I know there are people out there who care nothing about causes beyond their own self interest and who care nothing about their victims. I realize that these people are impossible to combat without the innocent coming in harms way. Yet the moment we fail to be ashamed of the harm we cause in the name of the cause, the moment we fail to acknowledge who is being harmed in the name of the cause, is the moment we become no better than them.
Here's a better example then. Publishing the truth or publishing opinions about political leaders is illegal in some jurisdictions. Would you be unwilling to provide help to these "bad actors"?
Lots of horrible dictators have used rhetoric like yours to rationalize/facilitate their actions.
The fact of the matter is, there really is no absolute objective moral compass; and yes, that includes "we should just stop facilitating violence" because you absolutely can be enabling others to take advantage of that to cause more harm.
You have to pick a stance and live with the harm that comes out of it (yes, whichever stance you pick, will cause harm).
> Publishing the truth or publishing opinions about political leaders is illegal in some jurisdictions. Would you be unwilling to provide help to these "bad actors"?
Realistically, I am unlikely to help since I am unlikely to understand the circumstances and I am especially unlikely to understand who I am aiding. Revolutionaries often look noble (or try to look noble) until they are in power and show their true colours.
Operating an exit node is something that I would be unwilling to do since it goes beyond possibly facilitating those who would want to do harm, it is pretty much a guarantee of facilitating those who would do harm.
> The fact of the matter is, there really is no absolute objective moral compass; and yes, that includes "we should just stop facilitating violence" because you absolutely can be enabling others to take advantage of that to cause more harm.
While I agree that there is no absolute objective moral compass, we each have a moral compass. We have to live by them. Will other people exploit those morals to their advantage. Undoubtedly. That doesn't mean we ignore those morals. Personally, I draw the line at facilitating violence.
Oh just because you are not affected yet, you might be in the future, most probably if no one is there to help against people with obscene power and they start to easily win
> Well, what would be considered a "really!!!" bad actor for some might be a hero for others. Just as an example, depending on which side of the Israel/Palestine conflict you are on, either side using your node for military intelligence might be an use worth fighting for or terrible abuse.
Stepping back though neither side in that conflict needs Tor. They both have numerous supporters in other countries where that support is legal. They can send and receive information through trusted outside supporters including some outside governments. They just need secure communication channels to a few representatives among those supporters rather than something is general as Tor.
> In the end, this really comes down to whether you value freedom or state protection more
If we're talking about the decision to actually run an exit node, I disagree with this breakdown of the ethics. I can value freedom more than state protection in the abstract while at the same time not feeling that helping support freedom in Russia and China and Iran is worth the cost of simultaneously helping to shield perpetrators of violence closer to home.
In most people's ethical frameworks choosing not to run a Tor node does not make me culpable for the actions of a state suppressing its people, but choosing to run one does make me at least somewhat complicit in shielding the perp of a bomb threat.
The USPS has an embedded law enforcement agency [0] whose full time job is to track down people who are using the postal service to commit crimes. Tor is very specifically designed to make an equivalent impossible.
‘Truly bad’ still relies on the perspective of the participant though. Parents point is that ‘bad’ is a matter of perspective, and that right or wrong, at lease some cartel/nk/isis operatives believe their actions are justified for some greater good, Palestine/Israel opinions and belief are obviously a more easy to understand perspective, but the point still stands.
You don't know that, you've never been there or probably spoken to a north korean. Not saying you're wrong (i can admit i have no idea), but i'm annoyed you're swallowing narratives from warlords who have been known to lie to start wars as if it's assumed default true
I have no idea about nk politics, but if the media continually pumps out ‘the west is the reason we’re starving, join the military today!’ then they might feel lucky to both be fed, and to be serving their country.
Really? Some cartel operatives believe their actions are justified for some greater good? Well unless you count filling your own pockets a "greater good" then they are objectively extremely deranged and delusional which possibly makes them even more dangerous.
> relies on the perspective of the participant though
> Parents point is that ‘bad’ is a matter of perspective, and that right or wrong,
Not really, though. Some things are just 'bad' (you or the perpetrator might not agree but that doesen't change that fact).
Nothing is inherently right or wrong, see moral nihilism. At any rate, cartel operatives may have other intentions than just simply fill their own pockets. Maybe they are selling medical marijuana to people in need because they would love to help people, and get money doing that, how about this?
This is the crux of every argument against free speech, no?
There is a fundamental trade off we have always had to make between safety and freedom. If you believe that privacy online is a freedom worth having, or if you believe one should be able to say whatever they want, you have to accept the bad with the good.
As soon as you start gating access by judging a person by what they're trying to do privately online, or what they're trying to say, you've thrown out that freedom and made it a privledge.
There's not even anything wrong with that if that's the world you would prefer to live in. Its important to know that's the tradeoff you're making though, and be prepared to accept the consequences if you one day find yourself running into new leadership that believes what you want to do online, or what you say, isn't worthy of the privilege.
> Its important to know that's the tradeoff you're making though
Exactly. This is all I'm saying.
I don't have enough knowledge of Tor to make an argument that it does more harm than good or vice versa. But I do know that a lot of people on here are just as ignorant as I am but are quick to assume that Tor must be inherently good because it protects privacy.
As I said, if you look frankly at the risks and decide that the benefits are still worth it, that's a decision I'm comfortable with you making. But that requires looking very frankly at the risks, which most seem reluctant to do in favor of high-minded abstract discussions of the merits of freedom and privacy.
This subthread spawned from someone who helped facilitate a bomb threat through an exit node they were running, and that kind of concrete harm needs to be mentioned in any discussion of the merits of Tor.
And someone else pointed out that the IRA used to send bombs through the mail. Yet we are not debating shutting down the Royal Mail because of that (and rightly so).
There are governments out there who kill people who criticise them, usually journalists. We need those people to continue their work. We do not want a world in which all communication is government-approved.
> the IRA used to send bombs through the mail. Yet we are not debating shutting down the Royal Mail because of that (and rightly so).
As I said elsewhere, at least in the US there's an entire law enforcement agency whose sole job is tracking down people who use the postal service to commit crimes and hurt other people. I'm sure there's an equivalent process in the UK. Tor is specifically designed to make that impossible.
There's really no comparison.
> There are governments out there who kill people who criticise them, usually journalists. We need those people to continue their work. We do not want a world in which all communication is government-approved.
I agree, and it may well be that on the balance we come to the conclusion that Tor is worth it. All I'm asking is that we stop looking at the harms as an abstraction and the benefits as concrete.
OP facilitated a bomb threat but seems to have thought primarily about how unfair it was that law enforcement subpoenaed them rather than the complexity of the moral choice they made and its consequences.
OP facilitated a bomb threat in the same way that the postman who delivered an IRA bomb did.
The complaint seems to be really about how the people who are hunting for the actual bad guys are so incompetent that they're hassling people running Tor exit nodes. The basic misunderstanding of technology is leading to unjust outcomes (whatever you think of the moral choices of people running Tor nodes; they are incapable of helping the inquiries so should not be subjected to these incompetent fumblings).
If the government thinks that Tor is a bad thing, and that running an exit node is immoral then we have a system in place to deal with that: pass a law making it illegal. Letting incompetent authorities hassle people who choose to do this perfectly legal activity is not the answer.
This trade off concept is a popular belief but completely fictitious and dishonest.
The state is not fundamentally better than the people as a whole. They just have more focused resources.
More resources to brainwash their subjects about how their power is always such a great and wonderful thing and is only ever used for good, and definitely better than people exercising power themselves.
Oh and also much more resources to gas people to death in camps, starve them to death, blow them to bits (but always for completely good and justified reasons of course).
I disagree. Centralizing power absolutely has the potential for providing more safety. Its up to those with the power to decide whether to provide it, and to whom they provide it.
I whole heartedly agree with your underlying argument that granting power to the state is never worth the trade off though.
Wasn’t the raid done in a democratic land? There is no gestapo in Germany in 2024, is there? Privacy is what terrorists love too. There needs to be a balance. Even guns need permits and psychological evaluation.
Be more precise in your thinking. This is not about bomb threats, this is about punishing people that provide a line of communication.
It is not a new concept that defendants of freedom of speech often have to protect scoundrels too. The argument doesn't change, it always has the same pattern and principle. And yes, it is advisable to err on the side of freedom, there is enough literature here to expand on that point.
Additionally the agencies that would demand these information are prone to break the law itself. So this isn't even a discussion about doing something just or not. This is purely a discussion about how much power you want the executive to have. Or in case of Germany, the often misdirected and overworked judicative branch.
Criminals and fraudsters will abuse pretty much every technology they can get their hands on. As a consequence, every service operator needs to do their part to prevent fraud and abuse. If you offer a service anonymously and indiscriminately, your service will be overrun by crooks, and you'll end up serving criminals.
The fact that your service could be used to defend free speech does not absolve you from your duty of monitoring the use of your service. If you realise your service is used for exchanging illegal content and bomb threats, it's your duty to do something against that, or stop providing the service.
I'm as much of a supporter of encryption as anyone, but I also accept that true effective encryption enables some pretty horrible things.
One of those "better look your meat in the eyes, before you murder and eat it" idealism-meets-realism moments.
On the whole, though, I think even with perfect encryption the remaining physical traces of illegality are sufficient for law enforcement purposes (granted: if more difficult).
I don't think the analogies to encryption are fair because a Tor exit node is far more active in shielding criminals than the inventor of a new cryptography scheme is. The inventor merely puts out an idea that can be used for good or bad. The exit node operator is actively paying on an ongoing basis to shuttle CSAM and bomb threats.
The exit node operator is also shuttling other content, so it's not wholly evil and on the balance someone might decide it's still worth it, but it's still a much less obvious ethical call than simply designing a piece of tech.
Someone has to pay for distribution, maintenance, and integrations of the encryption on an ongoing basis. If it was legal to write encryption but illegal to distribute it, what would be the difference from a ban? Both tor and cryptography require an ongoing effort to provide their service.
I see a pretty strong difference between hosting the latest build of gpg and actually running a server that moves the bytes that cause the harm. You may not, but I do.
You're naming things that are in the grey zone though. For example I can find polls [0] suggesting that North Korea is one of the least popular countries, but not strikingly different in absolute terms than someone like Russia or the USA. Internationally speaking they aren't unusually bad actors.
The problem with a "no shades of grey" stance is that in any large organised group there are going to be some good points and reasonable ideologies for why they have banded together to do what they do. They may be mistaken on important points, and it certainly may be necessary to put all empathy aside and try to ruthlessly crush them regardless of any good points they have - but in practice that approach almost always leads to terrible results compared to negotiating to emphasise the good and suppress the bad. Take ISIS - the reason we have groups like ISIS running around is generally because of a no-shades-of-grey approach taken to deal with their precursors. The US policy in the Middle East typically destabilises things (although they are hardly alone in doing that).
The "really bad" people have no conscience. No qualms about compromising the device of some innocent victim and then using that as their "exit node" if Tor wasn't available. So if Tor doesn't exist, that's what they do, and that's worse. Because not only do the bad guys still get to be anonymous, now the owner of the compromised system takes the blame. Which is more likely to be someone less able than you to articulate what happened, and who has to claim they were hacked with perhaps scant evidence rather than being able to point to their IP address on the public list of Tor exit nodes. They also might not be in a country with due process. So what you're doing there isn't helping the bad guys, it's saving some of their innocent victims from being unjustly punished.
Meanwhile the "good guys" who use Tor do have a conscience, so they wouldn't do that to an innocent third party, and then without Tor they have nothing. So you'd be helping them too.
We shouldn’t have keys then. Really bad actors are going to force your door anyway. Let’s at least save the doors.
Come on, Tor main use is child pornography and drugs. If you think you’re helping oppressed journalists, it’s 99% false. You’re mostly enabling all sorts of criminal activities, from benign to major. Hosting a tor exit nod doesn’t make you a hero, quite the opposite actually.
> We shouldn’t have keys then. Really bad actors are going to force your door anyway. Let’s at least save the doors.
Locks aren't for the really bad people, who are in fact going to break down the door. They prevent crimes of convenience.
But Tor is the lock, and the crimes of convenience would be e.g. mass surveillance of the population, in the event that ordinary people don't have it. So it's not clear what you're arguing here. That everyone should use Tor?
> Tor main use is child pornography and drugs. If you think you’re helping oppressed journalists, it’s 99% false.
Add to this, the illegal stuff isn't accessed via exit nodes, which link into the ordinary internet. Those things use hidden services, which are internal to the network and don't use exit nodes.
But let's even explore the premise. Suppose a lot of the traffic is people trading in illegal materials. Well, that's not really a big problem; people do that stuff via several other existing channels and the societal cost of each instance of someone buying pot over the internet isn't very high. Whereas the societal benefit of one single whistleblower is massive. These things can change the lives of millions of people. So even if it's 99% contraband, the remaining 1% is ten million times as valuable.
It's true that keys are mostly there to deal with minor bad actors and don't do much against determined adversaries. They are however not much of an obstacle to authorized persons which is why we use them.
You also may notice that in most civilized countries we do stop at somewhat weak keys and glass windows and don't bother with fortifying each house to withstand a full on assault from a criminal organization. That's because this will have a very high cost and we are better off dealing with criminals in other ways so this lack of protection is not a real concern.
I would use that argument if I were an oppressive government that was troubled by journalists using Tor to expose me. It's only 1% right? Think of the children.
Quoth Fidel Castro: ¿Armas para qué? (What do you need guns for?)
If your weapon against oppression is 99% enabling child pornography to thrive, I fail to see what overall good you are making. How many lives ruined for how many articles read?
You try to paint me as a "purist" that would allow the world to fall into the worst abusive governments just to save 1 child, but if you look at it honestly, you are at least as purist as me, because you would enable arbitrary amount of crimes just to save 1 journalist.
Assuming my 99% is accurate, the numbers are really not in your favor, plus journalists are grown adults that make their own choices, while children don’t chose to risk being abused, filmed and exposed online.
Even if we assume 99% of Tor is CP, that doesn't mean blocking Tor will remove 99% of CP. In fact, it probably will have no impact, as criminals will just use other methods, as they are well funded unlike oppressed journalists.
Surely there are also other ways for whistleblowers/journalists to communicate secrets. And why do you assume the random child porn creator/enjoyer is well funded? This kind of crime is more about availability and lack of consequences than money. Tor makes it invisible as no one will ever admit to it, but it's still easily available to anyone, with no consequences. Why are you so convinced that going after it is necessarily useless, necessarily harmful and necessarily wrong? I can't help but feel that it's a principled position, and that no amount of harm done would justify making it law-enforceable to you. How much lawlessness should we accept in exchange for how much whistleblowing? Any amount vs the slightest act doesn't sound like a good balance to me.
> In the end, this really comes down to whether you value freedom or state protection more...
This is again a forced binary "and/or"-decision, without anything inbetween.
It doesn't have to be like that - both can coexist, if both terms are not extreme.
(disclosure: my post is not related in any way to Israel nor Palestine and I'm personally not linked in/directly to anything related to Israel nor Palestine and this post is not related to the current conflict)
> Just as an example, depending on which side of the Israel/Palestine conflict you are on, either side using your node for military intelligence might be an use worth fighting for or terrible abuse.
The problem is when you choose to involve yourself in nation-state conflicts they’re just not going to care about your protestations of neutrality and freedom. They’re just going to see you aiding their enemy.
>In the end, this really comes down to whether you value freedom or state protection more; either of which can be abused by rogue actors or a malicious state, respectively. There is no win-win-solution, unfortunately.
I want to argue for freedom, on the grounds that most people know whats best for themselves better than others, so on balance there should be more people using that freedom for good, but then most people are busy, and not as motivated or knowledgable of how to use that freedom as the malicious actors are.. so is that even freedom in the end?
I don't think that dicotomy is quite right. bad actors can take away my freedoms (for example if they steal my bank account I'm no longer financially free as I'd have no money)
I don't know the correct balance. maybe it's just an impossible problem. I just don't think the two sides are freedom vs state protection.
> even government organizations/departments/agencies can be "local" and scattered (e.g. similar IT departments for each "canton" in Switzerland) and not have huge amounts of resources/knowledge to track/identify perpetrators of all ongoing (sophisticated?) IT crimes => somebody somewhere might see the same IP involved in a lot of "bad" stuff not realizing it's just a TOR node.
Decentralization is not an excuse for negligence. Anyone working in cybercrimes should be aware that Tor exists and of what it is. The list of exit nodes is public. Harassing the operators can only be one of malice or incompetence and neither alternative is excusable.
And it doesn't need to be a "really bad actor". I have been spammed by someone for years who clearly used a script to target an online service of mine. Always connecting from TOR, so banning an IP or a range wouldn't block that person.
This shows how easily TOR can be abused, even for small misdeeds.
Agreed.. this " I could not ignore the fact that any "really!!!" bad actor could use the same infrastructure to avoid investigation/prosecution," could be dependant on what you personally see as bad actor.
Would being gay count? In some countries it's a death sentence, so using TOR is how they avoid being thrown off a roof or stoned. Talking about anything LGB is a crime.
What about someone who wants to read 1984.. Would you be okay with them committing that crime?
> I hate the current general trend pushing a position of an either absolute "yes/no" for any theme, including this one (of encryption for privacy/etc vs. crime).
Exactly
Making an analogy, I feel these people are kinda the European ideological equivalents of the "sovereign citizens" in the US (though sure, they're usually more informed)
In one way, deeply concerned about very legitimate worries of free speech and privacy. In another way, very naive about what happens in the real world or how legal process works
Expectations: "We're helping people fight dictators!11" Reality: 80% malicious usage, 10% "just a prank bro", 5% people with legitimate uses and then the rest
I'm not sure what you mean with this "Wir schaffen das" reference. By attempting to be host refugees, one is committing the fault of being self-righteous?
Idealism around privacy and liberty are quite important, otherwise you end up with a worse country and there is a reason for laws to usually grant people these rights.
The law failed here and it is a typical problem for Germany, that historically and still today has problems with liberties in general.
FUD doesn't mean we should do away with liberty. To say otherwise is naive idealism that requires infallible human actors in security related agencies. That is impossible.
For the majority of Android phones, two to three years was also the length of time you got software updates of you bought the phone right when it was released, if you were lucky. I would have loved to pay somebody 80 EUR to replace the battery in my Samsung S10, but that wasn't an option since it was EOL.
Upgrading a phone also doesn't mean that the old phone goes to the bin or the new phone wasn't used before. Lots of people upgrade from one hand-me-down phone to another, others buy on the secondary market. Longer software support also extends the lifetime and viability of that market.
Sure, eventually the battery dies and the screen breaks. For many devices it's cost-effective to have somebody repair it. Having user serviceable batteries would make it much easier still.
My recommendation specifically about Amazon: don't webcrawl it (you'd need direct help from Amazon itself to get their data in some other way, some direct and consistent data interface).
Reason:
Wrote about ~10 years ago a crawler to discover books and to scan all of the books' ratings (the "stars" given to each book by a reviewer). It was just a hobby project.
At the beginning everything worked well, but after some weeks the layout of the pages and/or the technical IDs behind them started changing in an inconsistent way (some pages were still ok, others were slightly different, others were completely different).
My initial code was (surprisingly, hehe) excellent (nicely structured, flow & tasks of sections easy to understand, etc...), then I kept adding if/else conditions to the crawler at multiple places to make it able to cope with the new layouts/changes, after a couple of months I could hardly understand anything out of it (main point: I never knew if I could delete some portions as 1) it was garbled and 2) I didn't know if Amazon would present again old pages which would make old code relevant again).
Btw. (not directly relevant for the question) the organization of books was (is?) as well a mess:
the same book can be sold with multiple (often slightly, sometimes huge) different titles and/or authors (if more than 1 author wrote it) => ultimate confusion => at that time I fixed that by comparing the names of reviewers and their "stars": if book X had about 90% of the same reviewers AND same "stars" as book Y (data presented by Amazon can slightly change from query to query) then they were mooost probably the same thing (without comparing at all the title nor ISIN - from time to time titles of different versions of the same book were very different, even a human would have been very challenged to identify them as being the same thing, but based on what I saw Amazon knows very well what-is-what therefore even a book-version that sold 0 copies gets all reviews that got its twin book-version that previously sold 10000000 copies).
Thanks! sounds hard asf. I believe we can handle the inconsistence problem because we want <all> the products (so it'll be really general), however i don't think Amazon can list all their products on the webpage because of the huge amount. It'll be harder to reach the product url's than to scrap them :/
2) Each strand has an array of flowers which bloom serially => quite long blooming timespan (and damage by bad weather is limited if it affected only the flowers).
3) Bumblebees absolutely love them (this year I put exclusively Phacelia seeds into 1 of my 2 big pots on the balcony, with max seed density, and often there were up to 10 bumblebees at once per pot checking them), and I absolutely love bumblebees (they look clumsy, they're kind of funny + they absolutely ignore me, respectively when they happen to fly in my direction and they notice me they take a turn as soon as their flight envelope allows them to)
4) This might be just random or caused by some other factor like weather/neighbours/whatever, anyway:
since I planted this year Phacelia flowers and the bumblebees started coming I have hardly seen any wasps nor especially hornets (I've seen twice a hornet flying by, but it took a large curve from my balcony - during the same timespan at the other sides of my flat I noticed four times hornets investigating in front of the windows). Last year (without Phacelia/bumblebees) I had a lot more problems with wasps&hornets => maybe wasps & hornets noticed the bumblebees and thought "ah, already taken/busy!" and therefore marked my balcony as a no-go zone?