The Worst Ideas. Updates every Monday!

Your weekly source for terrible ideas.

Does your business require customers to agree to a “terms of service”? Run this incredibly illegal “INFINITE LENGTH CONTRACT” idea by your legal department! They will be impressed with your legal acumen.

Background:

Many web sites require a user to agree to a long and incomprehensible “terms of service” before they can use the site.

Since these contracts are dozens (or hundreds) of pages, everyone just scrolls to the end and clicks “AGREE.” (See two examples in Figure 1).

While you’d think that a company could slip in some secret contract clauses somewhere (e.g. “you agree to give up your first-born child to MegaCo Inc.”), this isn’t usually feasible—someone will EVENTUALLY find these clauses and cause a public relations disaster.

legalese

Fig. 1: Left: a relatively short contract that fits on one page. Right: a longer contract that no one will ever read.

Proposal:

Here is a secret method for putting totally unreasonable terms into a contract and preventing the user from being able to read them.

The secret is: the contract is literally INFINITE in length, so no one can read it all!

Details: the terms of service operates as follows (see Figure 2):

  • The first N pages are the real contract.
  • After the real contract is over, additional pages are randomly generated with legally-valid but meaningless legalese.
  • The contract has no scroll bar, so the user has no idea how long the contract is.
  • To accept the contract, the user clicks the “scroll to end and accept” button.
  • Thus, anyone who accepts the contract cannot have read the whole thing, since it is infinitely long.

Using this dirty trick, when a user has agreed to the contract after reading M pages, the company that wrote the terms of service can simply start putting the super-unreasonable contract terms on page M+1 and beyond.

 

legalese-infinity

Fig. 2: The “infinite contract” looks almost exactly like a real contract, except that there is no scroll bar or indication of how many pages the contract has. (This is because new randomly-generated “legalese” pages are created whenever the user clicks the “next page” button, so the user can never legitimately scroll to the end.)

Conclusion:

The only downside to this plan is that it is almost certainly totally illegal in every jurisdiction.

PROS: Would probably be an interesting “future law school textbook case” if it were ever tested in court.

CONS: You will probably go to prison if you implement this idea.

Advertisements

Throw away your current barbaric programming language! Programming Emoji is the future of computation.

Background:

Essentially all major programming languages exclusively use keywords written in English. (For a couple of exceptions, see the addendum at the end.)

But this doesn’t have to be the case!

Proposal:

By using symbols instead of words, we can convey a concept both more concisely and more easily across languages.

See below for a few suggested changes:

while-true

Fig 1: This image of a snake eating its own tail is a much more visceral and obvious representation of an endless cycle than the words “WHILE TRUE.”

if-else

Fig 2: “IF” and “ELSE” have specific meanings in English. But “Else” is also a Scandinavian name! By using these unambiguous symbols, we avoid any existing meanings that might confuse people.

data-types

Fig 3: Data types (“integer” / “floating point number” / “text string”) can be replaced by these intuitive images instead. This also avoids the issue of having multiple synonyms for each type. For example, a non-integer number could be called a “float,” a “real,” a “double,” etc.—but there’s only ONE symbol to represent this concept.

 

foreach

Fig 4: Some languages use “for” to create a loop, while others use “foreach” (or “forEach,” or “for (item) in (set)”). To prevent confusion, we can standardize on a single symbol (above) to convey the idea of iteration through a loo.

Conclusion:

Don’t write another line of code in your old-fashioned text-based programming language! Programming emoji is the future.

PROS: More easily seen at small font sizes. Works across languages, and prevents any misunderstanding arising from a word having an existing unrelated-to-programming meaning (e.g. “float” meaning “to rise to the surface of water” in addition to “a ‘floating point’ number”).

CONS: Requires new custom fonts and/or Emoji support.

programming-emoji

Fig 5: An extended set of proposed replacements for basic programming terms. Color is optional, but recommended.

Addendum:

Here are a couple of programming languages that can make use of non-ASCII symbols:

  • APL,” a language created in 1964, is well known for making use of a special set of symbols. Here is an example from Wikipedia: (~RR∘.×R)/R1ιR . It is actually possible to order a keyboard with these symbols printed right on the key caps!
  • Perl 6 supports numerical characters like “” (a fraction) or “” (a Roman numeral), as documented here.

 

 

The secret of SMART JUSTIFIED columns of text. This strange formatting tip will make ONE HUNDRED TIMES more employers look at your resume! Stop formatting your resume so amateurishly, and await your reward of gold and rubies from your future employer.

Background:

Columns of text in a book or newspaper are generally formatted in the fully justified style (Figure 1), where the text always lines up exactly on both the left and right edges.

justify-text-icon

Fig. 1: The “justify text” button (circled in red) can be found in nearly every text editor.

The issue:

Justified text works well if columns are wide and there are a lot of words to fill out each line.

But it becomes aesthetically dubious if the columns are narrow or there aren’t enough words, which result in either:

  • Extremely wide spaces between words if there are too few words (example: “this______column”)

or

  • Excessive spacing between letters if there is only one word (example: “c__o__l__u__m__n”)

In the worst-case scenario, a column of text may look like:

  • This____is_____a
  • n__a__r__r__o__w
  • c__o__l__u__m__n.

See figure 2 for a comparison of fully-justified text and ragged-edge (flush left) text.

justify-text-heres-the-problem.png

Fig. 2: Part A (left) shows a few problems with fully-justified text: “the age of” has excessive spacing and the between-letter spacing in “w i s d o m” is aesthetically questionable. Unfortunately, the ragged edge of the text in part B (formatted as “flush left / ragged right”) is not a huge improvement either.

Previously, a publisher would at least know how wide a column of text would be, so they could manually adjust the text to fit in an aesthetically-appealing fashion.

But with modern web pages and e-books, font sizes and column widths can be changed by the user—so there’s no way for a publisher to plan around it.

Proposal:

This problem can be fixed by using semantically-aware SMART justification to make each line of text an optimal length.

This is accomplished as follows:

If a line of text is too short, it can be lengthened by the following steps:

  • Add meaningless filler words (e.g. “um,” “like,” “basically,” “you know”)
  • Add superfluous adjectives (like “very” or “extremely”)
  • Replace words with longer synonyms (e.g. “rain -> precipitation”—this can also be used in reverse to shorten a line)
  • Replace pronounces with their antecedent (e.g. “her scepter” -> “Queen Elizabeth’s scepter”)

Figure 3 shows the performance of each method of text justification. The “meaning-aware SMART justification” is the only method that avoids ragged edges while also keeping a fixed amount of whitespace between words.

justify-text-annotated

Fig. 3: Left: a traditional example of fully-justified text. Middle: flush-left text, with an unappealing ragged right edge. Right: the vastly improved “smart” justification method, which has been recently made possible by advances in computational technology and machine learning.

Application of this method to famous books:

  • Original: “But man is not made for defeat,” he said. “A man can be destroyed but not defeated.” (The Old Man and the Sea, Hemingway)
  • Modified with superfluous filler words and synonyms:  “But man is, generally, not made for defeat,” he stated. “Basically, a man can be destroyed but, as you know, not forced to surrender.” 

 

  • Original: “War is peace. Freedom is slavery. Ignorance is strength.” (1984, Orwell)
  • Modified:  “War is peace. Additionally, the state of freedom is slavery. Finally, in conclusion, ignorance is strength, it must be admitted.”

 

  • Original: “In general, people only ask for advice that they may not follow it; or, if they should follow it, that they may have somebody to blame for having given it”.” (The Three Musketeers, Dumas)
  • Modified: “In general, people only make a request for suggestions, that those same people may not abide by it. Or, if they should in fact follow it, that those people may have somebody to blame or hold responsible for having given it”.” 

 

PROS: This is the ONLY text-formatting method that both 1) preserves inter-word spacing AND 2) aligns text in neat columns.

CONS: None!

Your chair is KILLING YOU! With its lack of artistic sophistication, I mean. Throw all your useless and harmful furniture into a huge bonfire, then replace it with eco-friendly low-polygon furniture for the health-conscious and trendy consumer.

Background:

Early 3D games used a relatively small number of polygons to create a blocky “low-poly” approximation of a game environment.

Three styles that occasionally come close to the low-poly look are:

But none of these styles are specifically aiming to minimize the number of visible surfaces in a building or interior.

Proposal:

In order to bring the “1996 Playstation graphics” look to interior design, the following easy-to-assemble low-polygon furnishings are proposed:

 

low-poly-chair

Fig. 1: At left, we see a normal chair. On the right, the number of visible surfaces has been reduced to almost the bare minimum. The chair on the right could easily be rendered by a Nintendo 64.

chair-trianglesFig. 2: Even this blocky chair still consists of 32 triangles. For computer-related reasons, surfaces are counted in triangles (the most minimalist polygon) rather than rectangles. Note that this chair essentially consists of three stretched-out cubes. Normally that would result in 36 triangles (3 cubes * 6 faces/cube * 2 triangles / face = 36 triangles), but we have saved a few triangles by merging the cubes in this way.

lamp-low-poly

Fig. 3: The standard lamp (left) can be converted into a low-poly lamp (right). The cord is unaffected—a segmented low-poly cord would unfortunately violate the electrical safety codes in most jurisdictions.

 

lamp-triangles

Fig. 4: The lamp above can be reduced to 21 surface-facing triangles if we allow the base (labeled “1*”) to be a single triangle.

PROS: This never-before-seen look combines minimalism with early-3D nostalgia in a way that is appealing to everyone.

CONS: Only slightly different from existing furniture you can get at IKEA, so differentiation of this style from “the cheapest possible furniture” style may be difficult. Safety regulations prevent the use of low-poly stylings everyone (e.g. in electrical cords).

Never worry about losing your laptop again with these TWO EASY TIPS that will shock and horrify you. You’ll never believe what happened next! The amazing secret of proximity-based encryption.

The issue:

Currently, the loss or theft of an unencrypted laptop can be a huge pain for an employee and/or their company.

If a laptop gets stolen out of a person’s car, or just gets forgotten in a train or cafe, it’s entirely possible that the laptop owner will now have to change all their passwords.

And if they were working on some sort of top-secret project, now it’s a major hassle to worry about what might (or might not) have been disclosed to a competitor.

Additionally, travelers to foreign countries with especially valuable company secrets may have to worry about state-sponsored corporate espionage.

Proposal:

If a user really plans to only use certain data while physically at work (and never access this data while off-site), the user’s laptop can have a special hard drive that can only be accessed while within range of a specific WiFi network (see the solid state hard drive mockup in Figure 1).

Thus, if the user misplaces their laptop or has it seized by a foreign government, there is literally no way to decrypt the data. (Unless the laptop makes its way back within range of the company’s WiFi network, but presumably the laptop would be blacklisted as soon as the theft/loss is discovered).

secure-drive-concept

Fig 1: The hard drive is integrated with a WiFi radio; the decryption key must periodically be refreshed by proximity to the company’s WiFi key broadcasting system. If this hard drive is taken out of range, the hard drive locks itself again.

Since the drive must be within the range of the company’s WiFi “key” broadcaster in order to decrypt (Figure 2), it is nearly impossible laptop theft to result in exposure of sensitive data.

(If an adversary did steal an encrypted laptop, they would theoretically be able to access the data if they 1) know the user’s password and 2) are able to drive the laptop to the company’s parking lot (within range of the WiFi) before the theft is discovered and the laptop’s access credentials are revoked).

secure-key-broadcaster

Fig 2: In order to access the files on the hard drive, the user must be within range of the “key broadcaster” (just a specially-configured WiFi network). Whenever the user takes their laptop off-site, the data will be totally inaccessible even if the user has the correct password.

Possible issue:

Would an adversary be able to circumvent this system by having a co-conspirator sit in the company parking lot, capturing all the (encrypted) WiFi traffic and re-broadcasting it over the Internet? (It seems like this method would be extremely labor intensive, plus the parking-lot-infiltrator would need undetected access to the company network.)

PROS: Makes it impossible for foreign travelers to be coerced into revealing their laptop’s contents, since the laptop owner themselves cannot even access the data while traveling.

CONS: Opens up new way for a company to lose all of its data if the decryption broadcasting system fails.

Fight back against “big deadbolt” with this amazing new style of home door lock! Burglars hate it!

Background:

The humble door-locking deadbolt has suffered from a severe failure of innovation and imagination in the last 100 years.

Specifically: most deadbolts have exactly two positions (Figure 1):

  1. Open (door can be opened from either side)
  2. Closed (door requires a key to open from the outside or a switch to be operated from the inside)

In some locations, especially in Europe, the deadbolt is even worse, as the closed position is:

  • 2b) Closed (door requires a key to open from the INSIDE as well). Somehow this is allowed by the fire code.

In either case, a key is required in order to lock the door, which can be annoying if you’re leaving in a hurry.

Fig. 1: A regular mechanical door lock (deadbolt) has two intuitively obvious—but primitive—settings.

Proposal:

Many door locks (but not deadbolts) also have a setting where the door can be set to automatically lock when pulled shut.

Additionally, many doors have two locks: a deadbolt and a regular door-handle lock. But there’s no reason we can’t combine the two locks into a single multi-function “dual lock” (Figure 2).

three-lock

Fig. 2: This updated “dual lock” handles both the deadbolt and door handle lock functionality, together in one convenient location.

Now the home’s occupant only needs to operate one lock when they want to open the door (instead of needing to unlock the deadbolt before using the key in the normal lock).

There’s no reason we can’t update this lock with even more options. See Figure 3 for an additional proposal.

four-lock

Fig. 3: This lock for the truly security-minded allows the door to be completely secured from the outside.

When the lock is in the lower-right position (as depicted), even the key cannot open the door from outside.

While this is not a common lock setting, the front door to the British Prime Minister’s office (10 Downing Street) works in this fashion (it can only be opened from the inside).

Conclusion:

Next time you’re thinking of doing some kind of home improvement, consider upgrading your door locks!

PROS: Simplifies the state of door locks and reduces the otherwise ever-expanding number of keys that are present in daily life.

CONS: Puts “big deadbolt” out of business.

Stop exercising! Instead: re-enact scenes from action movies! Burn off fat easily with this one weird tip that movie executives do want you to know! Fitness instructors hate it—the one totally untested secret to weight loss!

Background:

Exercise routines are often extremely dry and boring.

But they can be made more engaging by making a “themed” workout, with each part of a workout helping to accomplish an imaginary goal.

This is not a totally new idea. For example, the game “Zombies Run” motivates a person to jog faster by providing a virtual zombie horde to chase the player.

Proposal:

We can make a more general exercise program (i.e., not just running) by adapting scenes from major action movies.

Some movies actually already have a “workout routine” that could be used as-is, like the training montages in the Rocky series, or the rock-climbing sections of Cliffhanger (1993).

But almost any film can be adapted into a workout routine with sufficient creativity!

Examples below:

  1. Star Wars (1977), figure 1.
  2. The Empire Strikes Back (1980), figure 2.
  3. Raiders of the Lost Ark (1981), figure 3.
  4. Dances With Wolves (1990), figures 4 and 5.

star-wars-trash

Fig. 1: Star Wars: for the “Death Star trash compactor” exercise, you push against a large metal plate, while it tries to push back towards you. The plate could move back and forth several times. The exercise would be completed either when R2-D2 turns off the trash compactor or when you are pushed to the opposing wall by the plate.

star-wars-yeti

Fig. 2: This Empire Strikes Back-themed exercise requires you to hang upside-down from a pull-up bar, so it’s a bit inconvenient to set up in most gyms. The menacing ice creature (left) is an optional component, but that role could easily be filled by any fellow gym-goer.

 

boulder-sprint

Fig. 3: Action movies contain plenty of scenes that could be adapted to an exercise program. The rolling boulder escape from Raiders of the Lost Ark makes a great high-stakes sprint.

pull-horse-and-grind-coffee

Fig. 4: Dances With Wolves features a number of suitable inspirational scenes. Left: pull a bunch of heavy dead animals from the water supply (good for exercising a wide variety of muscle groups). For public health reasons, this workout would use sandbags instead of actual dead animals, even though this reduces the verisimilitude somewhat. Right: grind coffee.

dance-with-a-wolf

Fig. 5: You can’t really have a Dances with Wolves-themed exercise program if you don’t dance around a bonfire with a wolf.

Conclusion:

Movie studios should immediately seize this opportunity to release tie-in exercise programs (similar to the way tie-in novels / novelizations of major films are released).

PROS: Makes exercise more engaging and serves as an effective marketing / promotional tool to advertise a movie.

CONS: People might over-exert themselves when trying to escape a rolling boulder in a way that they wouldn’t in a normal exercise routine.