OPLIN 4cast #450: A new effort to stop child porn

Tuesday, August 25th, 2015

hand stop signalAs we all know, the Internet contains a lot of bleak and nasty stuff, and some of the bleakest and nastiest is child pornography. For almost two decades, the Internet Watch Foundation, an English charity, has worked to combat criminal material on the Internet, and most recently has focused on minimizing the availability of images of child sexual abuse. Now Google, Facebook, and Twitter have agreed to use the IWF database of images identified as child pornography and block those images from their web services. The IMF has sometimes been criticized for being too aggressive in its policing efforts, and no one is naive enough to believe that this new partnership will end child pornography, but it seems like it might have the potential to help.

  • Google, Facebook, and Twitter have a new strategy to ban images of child abuse (Motherboard | Kari Paul) “The companies are tapping into a database created by the Internet Watch Foundation (IWF) that uses hashing technology to identify and block child sex abuse images. The system works by running an illicit photo through an algorithm that creates a unique digital fingerprint for it. The hash is then added to the database that can identify the image if it is uploaded by another user, allowing the companies to detect and remove it without viewing the image itself.”
  • Hash List “could be game-changer” in the global fight against child sexual abuse images online (Internet Watch Foundation) “Not to be confused with a ‘hash tag’, a hash is a digital fingerprint of an image. There are billions of images on the internet and by creating a digital fingerprint of a single image, you can pluck it out, like finding a needle in a haystack. IWF will automatically begin creating three types of hashes to meet the needs of the online industry. It will create PhotoDNA (technology developed by Microsoft), MD5 and SHA-1 hashes.”
  • Facebook, Google and Twitter block ‘hash list’ of child porn images (The Telegraph | Sophie Curtis) “The IWF said many internet companies can make use of the hash list, including those that provide services such as the upload, storage or search of images, filtering services, hosting services, social media and chat services, data centres and connectivity services. The hash list is constantly growing, and has the potential to reach millions of hashes of images. The IWF claims to remove around 500 web addresses containing child sexual abuse material every day, with one web address containing up to thousands of images.”
  • Cambridgeshire’s Internet Watch Foundation launches “hash list” in bid to rid web of abuse images (Cambridge News | Florence Snead) “All five companies involved in the scheme’s first stage, which started last week, were already IWF members but if all goes well it could be rolled out to other members within a matter of months. The next step would be to approach organisations worldwide, who do not currently work with the IWF. The charity is keen to work with more image hosting companies which are at particular risk of being targeted by people putting such media online.”

Articles from Ohio Web Library:

OPLIN 4cast #442: Beam it up

Wednesday, June 17th, 2015

droneFacebook and Google are both involved in ambitious and interesting projects to economically expand Internet access to some of the most remote areas on earth by using the skies above us. Google’s Project Loon would use balloons in the stratosphere to connect cell phones on earth to the global Internet. Facebook’s Internet.org (with several other partners) would use a variety of aerial means, including drones, to do something similar. The technology behind these projects is pretty interesting, and certainly the goals are commendable. But some people are worried that the organizations driving this expansion of connectivity are for-profit Internet companies.

  • How Loon works (Project Loon | Google)  “Each balloon can provide connectivity to a ground area about 40 km in diameter using a wireless communications technology called LTE. To use LTE, Project Loon partners with telecommunications companies to share cellular spectrum so that people will be able to access the Internet everywhere directly from their phones and other LTE-enabled devices. Balloons relay wireless traffic from cell phones and other devices back to the global Internet using high-speed links.”
  • Connecting the world from the sky [pdf] (internet.org/projects | Mark Zuckerberg)  “For lower population densities, where people are spread out across a large area, the higher up you go, the more cost effective it becomes to place trunk stations and to deliver the internet. But signal loss will also be higher, so satellite access is only really a way of providing a basic internet experience for remote communities. Likewise, for high population densities, only lower altitude platforms will be truly effective, and connection speeds will be faster and the experience better for a lot of people. Given these challenges, Facebook is working on a range of technologies that will provide different options for connecting people.”
  • Facebook’s Internet.org platform is a privacy nightmare (MediaNama | Nikhil Pahwa)  “First up, no matter what Facebook says about Internet.org being a means of promoting Internet usage, it isn’t. It’s a fundamental, permanent change in the way the Internet works by splitting it into free vs paid access. It isn’t the same as giving someone Rs 10 of data access or even 100 mb. It is a permanent shift. While the kingmaker issue has been somewhat addressed by opening up the platform, there is only one true king in all of this, which is Facebook.”
  • Critics fear tech giant dominance of airborne internet (Al Jazeera | Tarek Bazley)  “But critics say Google’s search engine is already a powerful force online and any move that would see it controlling infrastructure as well, would give the company too much power. ‘Drones and balloons, these are awesome but what are they being used for?’ says Aral Balkan, an independent internet developer. ‘Are the underlying power dynamics changing? Or is it again a very small group of people exerting their power and control over a much larger group?’”

Articles from Ohio Web Library:

OPLIN 4cast #417: Battling giants

Wednesday, December 24th, 2014

Rock'em Sock'em RobotsHere’s something a little different for you. We’ve noticed quite a few stories lately about big tech companies getting into disputes with big countries and organizations – and we’re not talking about Sony and North Korea, which was more of a sneak attack than a confrontation. Taking these disputes as the theme of this week’s 4cast, we’re highlighting four different stories from one source (Ars Technica) about some big battles currently going on. Depending on how these disputes are resolved, it’s possible that one or both of the parties involved will change their ways, which might also affect us small folk. For now, though, it’s just interesting to watch from the sidelines.

  • Hollywood v. Goliath: Inside the aggressive studio effort to bring Google to heel (Ars Technica | Joe Mullin)  “Attorneys at Sony were on a short list of top Hollywood lawyers frequently updated about the MPAA’s ‘Attorney General Project,’ along with those at Disney, Warner Brothers, 21st Century Fox, NBC Universal, and Paramount. The e-mails show a staggering level of access to, and influence over, elected officials. The MPAA’s single-minded obsession: altering search results and other products (such as ‘autocompleted’ search queries) from Google, a company the movie studios began referring to as ‘Goliath’ in around February 2014. The studios’ goal was to quickly get pirated content off the Web; unhappy about the state of Google’s voluntary compliance with their demands and frustrated in their efforts at passing new federal law such as SOPA and PIPA, the MPAA has turned instead to state law enforcement.”
  • Microsoft tells US: The world’s servers are not yours for the taking (Ars Technica | David Kravets)  “The appeal is of a July court decision demanding that Microsoft hand over e-mail stored on an overseas server as part of a US drug trafficking investigation. Microsoft, which often stores e-mail on servers closest to the account holder, said the e-mail is protected by ‘Irish and European privacy laws.’ But a US judge didn’t agree. ‘It is a question of control, not a question of the location of that information,’ US District Judge Loretta Preska ruled. The order from the New York judge was stayed pending appeal.”
  • In wake of restrictive data law in Russia, Google pulls its engineers (Ars Technica | Cyrus Farivar)  “The move comes a few months after Russia passed a new law, taking effect in September 2016, that will require data held on Russian citizens to be kept in-country. The Kremlin and the Russian data protection authority known by its local acronym Roskomnadzor have used the law as a way to exert more pressure on Russian companies and foreign companies doing business in Russia, like Google, Facebook, Twitter, and others. Many Russia observers note that this law is likely to drive tech companies out of the country.”
  • The predictable result of Spain’s “Google tax”: No more Google News (Ars Technica | Joe Mullin)  “The Spanish Ministry of Education, Culture, and Sport published a response (Spanish) calling the Google News closure a ‘business decision’ and emphasizing that the newspapers’ websites were still available directly, as well as through Google’s regular search. The Spanish ‘Google tax’ effort followed shortly after German publishers gave up their effort to get an 11 percent cut of gross revenue from Google News. Technically, there’s still a ‘Google tax’ in effect in Germany, but it was up to individual publishers to try to collect, and they have generally given up on such efforts.”

Articles from Ohio Web Library:

OPLIN 4cast #398: Google and HTTPS

Wednesday, August 13th, 2014

padlockGoogle made an interesting announcement last week. Because they want to promote the use of secure, encoded HTTPS for website connections, they are going to make HTTPS a “ranking signal” for their search results. In other words, if a website uses HTTPS, it will show up higher in a Google search than a site that does not — maybe only a little bit higher for now since this will initially be just a minor ranking signal, but Google confesses that they may make it a more important signal later. Almost all the reaction was positive, except for tweets from people who work in the search engine optimization business, but as librarians, shouldn’t we be a bit concerned that the quality of information might be judged based on its format instead of its content, just so Google can make a point about web security?

  • Google Search starts penalizing websites that don’t use encryption (PC World | Jeremy Kirk)  “The move is designed to spur developers to implement TLS (Transport Layer Security), which uses a digital certificate to encrypt traffic, signified by a padlock in most browsers and ‘https’ at the beginning of a URL. As Google scans Web pages, it takes into account certain attributes, such as whether a Web page has unique content, to determine where it will appear in search rankings. It has added the use of https into those signals, although it will be a ‘lightweight’ one and applies to about 1 percent of search queries now…”
  • In major shift, Google boosts search rankings of HTTPS-protected sites (Ars Technica | Dan Goodin)  “TLS also provides a means for cryptographically validating that a server claiming to belong to Google, Bank of America, or any other website is authentic, rather than an impostor set up to trick users. Over the past few years, American Civil Liberties Union Principal Technologist Chris Soghoian has used a carrot-and-stick approach to persuade more sites to HTTPS-protect their pages. He sometimes publicly chastises companies that transmit sensitive information over unencrypted connections.”
  • Google boosts secure sites in search results (Electronic Frontier Foundation | Bill Budington)  “This week’s announcement further underlines a commitment to encrypting Internet traffic and keeping user data safe, and encouraging others to do so. We urge Google to go further and carry out its plan to strengthen the preference of HTTPS sites, as well as favoring sites that have configured HTTPS well…”
  • Google to reward sites with HTTPS security in search rankings (Forbes | Larry Magid)  “This is one more example of the power of Google’s ranking system. While Google doesn’t control content on the web, its search is by far the most effective way for content to be found so anything a webmaster can do to increase a Google ranking equates to more visitors and, in many cases, more revenue.”

Articles from Ohio Web Library:

OPLIN 4cast #396: Global communication

Wednesday, July 30th, 2014

Google Translate iconYou have to give Google credit for thinking big. Some recent developments seem to indicate that they believe it’s time for Google Translate, which has been slowly getting better, to truly make an impact on the global language barriers to communication. Translate can currently handle 80 languages, and if it’s not yet accurate enough for the medical community, it seems to be good enough for government websites trying to engage the 10% of Americans with limited English proficiency. So what is the best way to accelerate improvement of Google Translate? Google’s answer: They have empowered Translate users to do the job.

  • Translate Community: Help us improve Google Translate! (Google Translate blog | Sveta Kelman)  “We’ve just launched a new Translate Community where language enthusiasts can help us improve translation quality for the 80 languages we support, as well as help us in launching new languages. In the new community, you’ll find options to help with a variety of things, including generating new translations and rating existing ones. Over time, you’ll find more ways to contribute, as well as get more visibility into the impact of your contributions and the activity across the community.”
  • Google wants to improve its translations through crowdsourcing (TechCrunch | Frederic Lardinois)  “For those who don’t want to join the community, Google also recently launched a new feature directly in Google Translate that allows you to contribute your own translation when you see a mistake. Google Translate always allowed you to rate translations as helpful, not helpful and offensive, but now you can actually provide the service with the actual correction.”
  • Google Translate gets Translate Community to improve translation quality (TechOne3 | Jagmeet Singh)  “Apart from making an authorised community, Google has recently added the ability to suggest an entirely new translation directly in Google Translate. To submit translations, users have to click the ‘Improve this translation’ pencil icon and click ‘Contribute’ to submit.”
  • Five things to consider before using Google Translate for Bengali translation (Smartling blog | Rehana Parvin)  “Every time Google Translate isn’t able to translate a word into Bengali, you can add the word in manually, save the change, and use it the next time. Taking the same example from above, the word, ‘বইয়ের’ is incorrect. The correct word would be ‘বইটি’. If you click on the word ‘বইয়ের,’ you’ll be able to click and choose the correct replacement.”

Articles from Ohio Web Library:

OPLIN 4cast #387: Social WiFi

Wednesday, May 28th, 2014

social wifiEver heard of social WiFi? Well, we know that using any password to authenticate users of a WiFi network, even a simple one posted on signs around the library, is good practice because it automatically encrypts the WiFi traffic instead of sending it through the air in clear text. So what if you asked your library WiFi users to login with their social media credentials instead of yet-another-password. And then a library computer could look through their Facebook postings (for example) to look for the kinds of books they like to read and send them “ads” for similar books in your library. That kind of thing is called “social WiFi,” and it’s a significant trend in businesses that provide public WiFi.

  • Purple WiFi and Wavelink join forces to offer social WiFi (Connect World/Purple WiFi press release)  “The guests log into the secure hotspot system using social media authentication, via networks such as Facebook or Twitter. The venue providing the connection gains valuable demographic and engagement information from users through its Purple Portal, which allows the business to understand who is visiting and using their hotspot, how long they are online, as well as their age, gender and any other relevant information that they offer in their social networking profile. The portal also provides a powerful engagement tool to promote relevant offers, essentially rewarding guests for visiting the venue.”
  • Social WiFi sign-in: Benefits with a dark side (Network COmputing/Lee Badman)  “As strange as it seems, despite the wide-open nature of our social media personas, we still expect a modicum of control over how our information gets used. Social WiFi undercuts that odd, fragile handle we have on our social media data to monetize and upsell us in ways that don’t make me really comfortable. Once the data is mined and conclusions are drawn from it, we become new people in the eyes of the social WiFi provider, with no control over how the process presents us.”
  • Too much information? Facebook, Google face backlash over logins (Wall Street Journal/Elizabeth Dwoskin)  “Facebook recently said it would begin to offer anonymous logins and also allow users to choose which data they want to share, a response to privacy concerns. The head of Google+ recently stepped down amid signs the social network isn’t popular with users. ‘We’ve gotten feedback,’ said Eddie O’Neil, product manager for Facebook Login. ‘We first heard from people that they want more transparency, second, more control.’”
  • Social Wi-Fi and privacy: Keeping balance in the force (AirTight Networks blog/Sean Blanton)  “Remember that while mobility is fairly ubiquitous in our society, it very much skews to millennials who (like myself) are getting older and expanding our interactions beyond school and home. I’d argue that free Wi-Fi and a dessert coupon in exchange for my name, age and city is a pretty sweet deal, and I’d be excited to see what other places I frequent would provide me with a tailored experiences instead of generic, seemingly unhelpful ones.”

Login fact:
According to recent data collected by LoginRadius, people use a Facebook account most often for social logins (49%), followed by Google+ (29%), and Twitter (6%).

OPLIN 4cast #386: The right to be forgotten

Wednesday, May 21st, 2014

EU Court of Justice emblemOn May 13, the Court of Justice of the European Union (EU) in Luxembourg ruled that an individual can demand that Google remove certain search results that appear when someone Googles that individual’s name. This landmark ruling on the “right to be forgotten” quickly became the topic of a flurry of media stories. Many librarians may not be sure exactly how they feel about this topic. On the one hand, as the Index on Censorship noted, withholding selected information may seem “…akin to marching into a library and forcing it to pulp books.” But on the other hand, libraries are carefully protective of their users’ privacy. What is the best balance between the right to know and the right to privacy?

  • US v Europe – a cultural gap on the right to be forgotten (BBC News/Rory Cellan-Jones)  “So a battle between two views of freedom – the US belief that free speech trumps everything, and the European view that individuals should have some control over what the world knows about them. But there is something else in play here, a growing unease about the power wielded by what are nearly always US web giants over our lives. Google, Facebook, Twitter and other firms that store and use vast banks of data about Europeans have all sought to deny responsibility for how people use and share that information.”
  • ‘Right to be forgotten’ ruling creates a quagmire for Google et al (The Guardian/James Ball)  “Most major tech giants are based in the US – which thanks to the first amendment, is very unlikely to require companies to restrict search results (ie what they can ‘publish’) due to overseas privacy requirements. The results could become exceedingly strange: will people searching from the US be able to see the ‘private’ data of EU citizens, while natives of those countries cannot? Or will companies with no EU footprint be able to serve up results, but those with sales offices in EU countries be required to censor them?”
  • The myths & realities of how of the EU’s new “right to be forgotten” in Google works (Search Engine Land/Danny Sullivan)  “One strategy would be for Google (or any search engine) to decide not to decide. Any request it receives, it could respond that unless the request relates to some very specific situations, it will be rejected because Google doesn’t believe it can fairly judge between the right of privacy and the right of free speech. Instead, Google could recommend that someone go to a particular country’s privacy agency for a ruling and let that agency make the call.”
  • UnGoogle me: The case for scrubbing search results (Business Week/Paul Ford)  “Google has long been willing to scrub the public record in order to ease the distress of its users. It doesn’t advertise this widely. But its index has never been total. Illegal material, copyright violations, and the like have been kept out. Google is not an impartial arbiter of the Web. It is a mediated, incomplete index, influenced by plenty of outside factors and long-term commercial goals.”

Case facts:
In 2010, a Spanish man filed a complaint with the Spanish Data Protection Agency (Agencia Española de Protección de Datos, AEPD) against Google and a newspaper that had published an item about his financial situation in 1998. The AEPD rejected the complaint against the newspaper, but asked Google to remove the item from their search results. Google appealed to the Spanish National High Court, and that court referred the question to the EU Court of Justice in 2012.

OPLIN 4cast #371: Google of the future

Wednesday, February 5th, 2014

DeepMind logoA couple of weeks ago, Google confirmed that it had purchased DeepMind, a London artificial intelligence company. This set off a flurry of speculation in the technology press: What is Google planning now? Nobody but Google knows for sure, but some of the best technology journalists think they have it figured out, though they don’t completely agree. We will probably know soon enough what the Google of the future will be, but it seems certain that this latest acquisition has something to do with Google’s core objective to make all of the world’s knowledge accessible.

  • Google’s game of Moneyball in the age of artificial intelligence (ReadWrite/Dan Rowinski)  “This is exactly what Google is doing: exploiting market inefficiency to land undervalued talent. Google determined that intelligent systems and automation will eventually be served by robotics and has gone out of its way to acquire all of the pieces that will serve that transformation before any of its competitors could even identify it as a trend. By scooping up the cream of the crop in the emerging realm of robotics and intelligent systems, Google is cornering the market on talented engineers ready to create the next generation of human-computer interaction.”
  • Google acquires human-like AI company for $500 million, Skynet is now a real possibility (ExtremeTech/Sebastian Anthony)  “…DeepMind appears to be in the business of creating artificial general intelligence (AGI). The co-founder and apparent brains of the operation, Demis Hassabis, has published some papers on AGI. AGI (sometimes referred to as strong AI) is different from conventional AI (weak AI) in the sense that it is capable of performing (and learning from) very general tasks. Most AI (weak AI) is programmed to perform a very specific task…. AGI, on the other hand, is programmed so that it solves problems in a much more human way. Where weak AI is usually characterized by speed and accuracy, strong AI is more closely linked to reasoning, planning, self-awareness, consciousness, and communicating in natural language. In other words, if you want to build useful, human-like robots, you need a really good AGI.”
  • Google buys A.I. company for search, not robots (New York Times/Nick Bilton)  “People who work with Google but could not be named because they were not allowed to speak publicly for the company, said the acquisition of the artificial intelligence software had nothing to do with robots, but everything to do with semantic technology and the ability to understand what people were asking for online and answer in a very human way.”
  • More on DeepMind: AI startup to work directly with Google’s search team (Re/code /Liz Gannes and James Temple)  “So what will Google do with DeepMind? Artificial intelligence is core to many teams at Google, from the self-driving car to the search results page. Jeff Dean (the Google executive running the team that DeepMind is joining) was the lead author on a paper in 2012 that boasted of training a deep network ‘30 times larger than previously reported in the literature’ for the purposes of large visual object recognition tasks and speedy speech recognition. He also worked on a somewhat famous project where a neural network of 16,000 computers presented with stills from 10 million YouTube videos taught itself to recognize cats.”

Purchasing fact:
In addition to DeepMind, Google has recently purchased at least six robotics companies.

OPLIN 4cast #356: Will cookies be replaced?

Wednesday, October 16th, 2013

broken cookieTwo years ago, we wrote about zombie cookies (the web kind) that won’t die and continue to track Internet users despite efforts to kill them. Last Friday, the Washington Post ran an article about the probable collapse of the working group affiliated with the World Wide Web Consortium that was supposed to set up Do Not Track standards. And rumors also began to surface last month about new technologies that would replace the cookie and track users in new ways for which there would be no immediate remedy. If this makes you uncomfortable, you’ll be really thrilled to learn that the companies pushing the efforts to replace cookies are some of the giants of the Internet.

  • A Google cookie replacement could upend online advertising (Ad Age/Tim Peterson)  “Third-party cookies are already endangered. First-party cookies come directly from the sites you visit, but third-party cookies are placed by others. The “Do Not Track” movement now causing so much conflict is predicated on making it harder for companies to use third-party cookies to follow consumers around the web and serve ads based on their behavior.”
  • Replacement for tracking cookies could have big impact (San Jose Mercury News/Larry Magid)  “Web operators that use cookies will not only deny that they can identify actual users, but will also fire back that the ability to target ads is essential for them to make the money they need to offer the services we want. And they have a point. We all love being able to read news, conduct searches and do our research, without having to fork over a credit card. Collectively, companies spend billions of dollars to offer these free services and they have to recoup that investment.”
  • Microsoft joins the anti-cookie movement, working on its own replacement (Marketing Land/Ginny Marvin)  “Microsoft and Google both have said their efforts in this area are in early stages. Still, the move toward proprietary technology by a handful of behemoths — Google, Apple, Facebook and Microsoft among them — gives pause to many in the industry. Not only would these companies have insight into the data generated from their tracking technologies, there is the potential these companies could hoard advertiser data.”
  • Google may ditch ‘cookies’ as online ad tracker (USA Today/Alistair Barr)  “The Interactive Advertising Bureau, which represents the industry, at least wants some type of tracking technology available for advertisers, whether third-party cookies or something else, said Mike Zaneis, the group’s general counsel. However, leaving such ad identifiers in the hands of a few large companies is not ideal, he added. ‘They could deprecate the use of that ID on a whim, basically, and severely undermine billions of dollars in digital ad spending,’ Zaneis said.”

Mobile fact:
These big companies are not replacing their tracking technology just because they don’t like cookies. They’re looking for something different because third-party cookies don’t work on mobile devices, and mobile devices currently account for about a fifth of all web traffic.

OPLIN 4cast #339: Smart(phone) websites

Wednesday, June 19th, 2013

google mobileGoogle has a lot of power to control which websites receive web traffic and which don’t, simply by altering the way they present search results. In the past month or so, it has become clear that Google wants to advance the development of websites that efficiently handle traffic from mobile devices. One way they intend to do this is by lowering the search rankings of websites that improperly redirect mobile users to special web pages or error pages, rather than using something like “responsive web design” (RWD), which automatically adapts the layout of a page depending on the type of device accessing it. Does your library’s website handle mobile users properly?

  • Now Google wants to kill the mobile web (ReadWrite/Owen Thomas) “You know those clunky, stripped-down versions of sites with addresses that tack an ‘m.’ onto the beginning, and serve up a dumbed-down, limited version of their content? If Google has its way, those sites are headed for the dustbin of history. At I/O, Google’s developer conference held this week in San Francisco, executives Sundar Pichai and Linus Upson showed off examples of websites that traveled smoothly from desktops to tablets to smartphones.”
  • Thank you, Google overlords (TechCrunch/Sarah Perez) “If you’ve at all used the web on your smartphone, then you’re all too familiar with this frustrating experience – you do a search, tap on a result for an article you want to read, then end up staring confusingly at the site’s mobile-web optimized homepage. Where is the content you wanted? Who knows! It’s a huge waste of time and bandwidth to have to deal with pages like this when surfing on a smartphone, and Google is now going to make sure that sites like that no longer get top placement.”
  • Changes in rankings of smartphone search results (Google Webmaster Central Blog) “Avoiding these mistakes helps your smartphone users engage with your site fully and helps searchers find what they’re looking for faster. To improve the search experience for smartphone users and address their pain points, we plan to roll out several ranking changes in the near future that address sites that are misconfigured for smartphone users.”
  • Mobile site speed to be a Google ranking factor? (WebProNews/Chris Crum) “Google is making it so you have no excuse to treat your mobile content with less regard than your desktop content. Frankly, sites should be optimizing for mobile anyway, simply for the benefit of their users, but if ignoring the mobile experience is going to cost sites search rankings, perhaps this will light a fire under their butts to do something about poor mobile site performance.”

OPLIN fact (and sneaky promotion?):
If your library uses an OPLIN Dynamic Website Kit, no worries. All new sites are built with responsive web design, and all existing sites should be upgraded within the next year or so.