Saturday 19 November 2022

Excel rounding feature

** Update 2023 Added When Excel goes ( is used badly ) impacting careers 

I have an Excel spreadsheet that I use for keeping the accounts for a small club. The spreadsheet has one page for income, one page for expenditure and another page that totals up and displays current balances. On the income and expenditure page I add an entry for each transaction. The line starts with a total amount for that transaction and then the same amount spread across various columns depending on which items that transaction relates to. I then sum the columns and they should cross match. The sheet uses simple conditional colouring red and green to indicate when numbers that should add up don't add up. 

I was just about to send a spreadsheet to a new colleague when I noticed one of the red indicators showing and yet despite the numbers appearing to add up correctly. After extracting the relevant numbers into a fresh new spreadsheet, I could see that the difference between the two sums was very very small, a rounding error of  0.0000000000109139 

Excel has a feature where you can set the display precision of numbers typically used for currency, that its two decimal places. However, internally it will work to much higher position unless a certain option is checked for the spreadsheet. That option "set precision as displayed" is supposed to ensure that Excel uses the same precision for calculations and display. This is generally a dangerous option as you can get accumulations of errors through lack of precision in complex sheets. 

On the sheet extract shown below the indicator square has the formula

=IF(SUM(B8:B397)=SUM(E4:T4),"MATCH","FAIL")

The vertical numbers are summed into square C6, and the horizontal numbers summed into D6. Subtracting C6 from D6, gives us the size of the rounding error in square D8. 

Changing the Excel option for  "set precision as display" changes (and clicking on the warning) the value of the displayed rounding error shown in D8 to 0 as one would expect. However, the indicator square remains at FAIL showing that the interior precision is maintained during the above type of test operations.

The fix was to change the indicator to use ABS(C6-D6)> 0.000001 as the test for a match.







On a Mac the option can be found at Excel -> Preferences -> Calculations


Using Excel for Mac 16.67.





Wednesday 10 August 2022

Apple Powerbook 230 - resurrection and other old Apple items

Okay I admit it in a moment of late night madness I bought an old MacBook Duo 230 on eBay. The usual late night buying rules applied I didn't look close enough at the listing and the listing skated over a few fairly essential details. The reason for the purchase, obscured by the late night enthusiasm, was to resurrect some data as part of a computer history investigation project.

I was super optimistic when the package arrived because the laptop floppy disk drive power supply and the essential Duo mini dock all arrived packed with bubble wrap. Obviously sent by somebody who cared for the safe delivery of the system.

Once powered up the system booted and sprung into life. The screen was looking a little fuzzy with artefact lines running out from some corners but was plenty readable and as a bonus the mouse ball worked as well. The hard drive was a little nosy but the main issue was system software, or lack of it, on the machine. The only icons visible on the screen were the disc tools rescue set. This is a small collection of utilities, used to check hard and format disk drives, was just enough boot the machine but provided no applications. 

One more eBay purchase, from ebay seller applefloppiesonline, later and I had a set of floppy discs, MacOS system 7.5, suitable for this machine. 

I had forgotten how long it took to do installs from floppy disks, typically about three or four minutes per floppy disk. If an install fails then the process backs out and you're basically exactly where you started. This happened a couple of times. Was fun for a while to listen to the whirr and click of the floppy drive but playing games of install "Snakes and Ladders" was not really what I was after. 

The floppy disk install eventually worked but I had a lot of trouble reading Install Disk 4. See videos below.

With the system booted off the install disk 1 and reading all the other disks with no trouble, This install a couple of times on Disk 4. This repeated failure issue by trying a few OS installer tricks remembered from back in the day:

  • Copying Install disk 4 contents on to the hard drive then back out on to a spare Floppy drive. 
  • Doing a custom minimal install for the this Mac only. ID4 is needed by all the system install options as it has the control panels files but this choice would minimise the files loaded from ID4.
  • Renaming the system folder. Ater a crash and reboot this didn't seem to make any difference as the install still used that folder. I speculate that the rename action may have cleared some read-only items in the system folder.
Not sure which of the above fixed the issue but we got there in the end. Now the system is up and installed with the utilities and software that it needs I can see that the on-board mini batteries that preserves the date and time between connections has failed which is not unusual for older machines. Also failed is the main battery neither charges nor holds a charge. This limits the machine to running on plugged in power and necessitates resetting the date and time from 2039 back to the current date each time the machine is unplugged.

Ports from Left to right
Built in modem hole ( missing ), Kenington lock, Mic, speaker, Scsi disk, Printer,  External modem , VDU screen, AppleTalk networking, Floppy Disk, Power, on/off switch.

Despite the many connectors on the back of the dual dock there are few that are in used today. Apple desktop bus, for connecting keyboards and mice, has been replaced by the universal serial bus ( USB ). modern screen connections are now VGA or DVI replacing the 25 way pin socket. Most importantly networking has moved on from AppleTalk wiring to CAT5 ethernet.

I guess if I was going to do this again I would consider more carefully in the machine I was going to buy. I probably would've gone for a blue and white G3 as that machine was on the cusp of changing technologies and could use both the older keyboards mice as well as USB. Had Apple talk as well as ethernet. We had that very machine with a USB floppy disk drive that went into the more modern Macs and that would've probably been an easier choice for moving data from old Apple floppy disks to a modern / internet connected system.

What's next for the Duo. The data rescue project has moved on and without a modern network connection this may not be the older machine I am after. Tinkering around with the old technology was kind of fun but without more relevant application software it's hard to show the capabilities of this older machine.

See on YouTube here. Install Fail 1 and Install fail 2

A few photos from the failing installs. 











Finally installed and showing the Memory Control Panel.



The machine I probably should have bought for this project.


Along with one of these ... USB Floppy disks




Just for old times sake the Apple machine we loved the most - The sun flower G4 iMac. This was the second version with the wider flatscreen.



For further reading on old time Apple kit see   



Monday 25 July 2022

Cray Research, Discover, Explore and celebrate

Check out this talk at The National Museum of Computing in the UK held for the 50th anniversary of the founding of Cray Research.

Cray Research : Discover, Explore and Celebrate




If you liked that check out the earlier  Cray Research - A Story of the Supercomputer
produced at CFIMT


Enjoy.

Monday 2 May 2022

Sky domestic broadband DNS stale data and intercept layer.


I have seen that Sky Broadband Consumer service has an intercept layer for all DNS queries which can result in stale data problems when servers change IP addresses. Also DNS queries pointed towards nonexistent DNS server will still succeed but may provide old or incorrect data.


Using the Google dig tool on 

https://toolbox.googleapps.com/apps/dig/

Gives the correct result but the local Sky Broadband command line equivalent look up that is supposed to be using Goggle DNS server ....

% dig  @8.8.8.8  domainname.com MX

Gives a stale out of date answer  hours after the result should have changed.

Given a non-existant DNS server with an address similar to Googles connection is not possible 

% ping 8.8.8.99 

PING 8.8.8.99 (8.8.8.99): 56 data bytes

Request timeout for icmp_seq 0

Request timeout for icmp_seq 1

^C

but DNS look up succeeds 

 

% date; dig  @8.8.8.99  apple.com MX      

Mon  2 May 2022 14:29:38 BST

 

; <<>> DiG 9.10.6 <<>> @8.8.8.99 apple.com MX

; (1 server found)

;; global options: +cmd
......snip 

;; ANSWER SECTION:

apple.com. 3600 IN MX 10 rn-mailsvcp-ppex-lapp15.apple.com.

apple.com. 3600 IN MX 10 rn-mailsvcp-ppex-lapp24.apple.com.

apple.com. 3600 IN MX 10 rn-mailsvcp-ppex-lapp34.apple.com.

apple.com. 3600 IN MX 10 rn-mailsvcp-ppex-lapp35.apple.com.

apple.com. 3600 IN MX 10 rn-mailsvcp-ppex-lapp44.apple.com.

apple.com. 3600 IN MX 10 rn-mailsvcp-ppex-lapp45.apple.com.

apple.com. 3600 IN MX 10 ma1-aaemail-dr-lapp01.apple.com.

.......


Gets you an answer. How is this possible or correct ????

This has the follow on implications :


1) DNS lookup results can be stale or incorrect hours after a change at source.

2) Changing the DNS settings on your PC/Device  makes no difference as the "Sky Results" are used in any case. 

3) All DNS lookups can be recorded / traced at the ISP level.

4) Time to live should be set low on domains that are going to change, then reset after the change has propagated to a longer time, to avoid excessive lookups. This would also avoid any excuse by Sky for keeping stale data when no-one else does.

5) DNS interception by Sky Broadband could be considered a man-in-the middle compromise of the correct functioning of the DNS system. 

6) Of the 6 failures ( lasting over 5 minutes ) of Sky consumer broadband that I have experienced and investigated over the last few years, 3 have been wire to the house failures and 3 have been DNS service failures. The DNS service was designed to be failure resilient by using recursive lookups to higher domains but if all queries are intercepted by an intermediary and that intermediary has a problem the robustness of DNS is compromised.

Only solutions are to use external tools to check against Sky DNS results. Or use a VPN. Not sure if other consumer ISPs have this configuration. A colleague doing the exact same look ups on another ISP server did not see the delay in the domain data being updated.

Tuesday 15 February 2022

Fake Psychic - investigations by the BBC and others

Understand the implication of twisting the faith and belief of others by reviewing how psychics and mediums have worked their "magic" to fleece and distort the beliefs of folks.
The true-believer syndrome merits study by science. What is it that compels a person, past all reason, to believe the unbelievable. How can an otherwise sane individual become so enamored of a fantasy, an imposture, that even after it's exposed in the bright light of day he still clings to it — indeed, clings to it all the harder?… No amount of logic can shatter a faith consciously based on a lie. 
        — M. Lamar Keene and Allen Spraggett


Full BBC investigation podcast as "Fake Psychic" 

M Lamar Keene. Photograph: 1878 Press

Wikipedia Notes on Lamar here 
Guardian Article "Scam the bereaved, defraud the dead: the shocking crimes of America’s greatest psychic conman"  Here


See also about Camp Chesterfield scamming punters since 1891 and still at it in the 2000s.


Camp Chesterfield as founded in 1891 and is the home of the Indiana Association of Spiritualists, located in Chesterfield, Indiana. Camp Chesterfield offers Spiritualist Church services, seminary, and mediumship, faith healing, and spiritual development classes, as well as psychic readings for patrons.

As recent at 2002 Filed at centerforinquiry.org "Undercover Among the Spirits: Investigating Camp Chesterfield " 



See also "How to cheat at everything" by Simon Lovell



Friday 4 February 2022

Book Club best reads

 Joined a book club in first lock down and have been reading new and recycled books over the last couple of years. Some are found and re-read from the best books box in the attic, some new via Kindle or second hand via ebay / Amazon marketplace.


In no particular order - these are great reads.



















Wednesday 19 January 2022

Coercive and controlling behaviours leads directly to abuse in multiple religious organisations.



Examples of deviant and toxic abusive with coercive control behaviour can be found in multiple religious organisations :

This article leads on to others:


"What marks religious organisations out from other institutions is the explicit purpose they have in teaching right from wrong; the moral turpitude of any failing by them in the prevention of, or response to, child sexual abuse is therefore heightened."

Other examples :

The Moody Bible School toxic culture USA

They Went to Bible College to Deepen Their Faith. Then They Were Assaulted—and Blamed for It.


Former evangelical vicar ‘was left to administer naked beatings, ice bath punishments and perform sex acts in front of people’ when church bosses took 'little or no action' over claims against him, investigation finds

After five years of sadistic beatings in a garden shed by one of the UK’s most prominent barristers, and with a “special beating” to mark his 21st birthday imminent, Andy Morse tried to take his own life. The student had endured thousands of lashes on his naked buttocks administered in the name of Jesus by John Smyth QC. He could no longer endure the pain, terror and humiliation.

C&C behaviour is often a pre-cursor to other even more serious abuse behaviours .... and not just with evangelical christians and well known cases in the Catholic church and islamic Madrasas : 
and
The dark side of Pakistans Madrasas rampant child abuse few checks and balances. 
and
Abuse behind closed doors madrasas in India. 

This is an ongoing problem 
Millions of children in religious groups in England and Wales vulnerable to abuse.  IICSA report finds victim blaming, abuse of power and mistrust of authority to be commonplace..... The Independent Inquiry into Child Sexual Abuse (IICSA) said there was “no doubt that the sexual abuse of children takes place in a broad range of religious settings”. It found evidence of “egregious failings” and highlighted the hypocrisy of religions that purport to teach right from wrong, yet fail to protect children. IICSA’s investigation examined child protection in 38 religious organisations and settings in England and Wales, including Jehovah’s Witnesses, Baptists, Methodists, Islam, Judaism, Sikhism, Hinduism, Buddhism and nonconformist Christian denominations.

Meanwhile over in the Guatemalan jungle a small extremist "jewish" sect mistreats children and followers.

Turns out the social community L'Arche was founded by Jean Vanier partly for the purpose of finding exploiting women and children. This was a case of corruption at the core of what was otherwise a caring place for folks with special needs.

Whilst "Think of the children" is a bit of dog whistle on the interwebs the above methods and facts of abuse are real.

Also this interesting analysis of an interview between media host and leader of a kids after school club run by a Satanist's Temple. 





The Telegraph having a dig into the "Cult of armageddon" also known as JW.ORG and their self centred and self serving child protection actions.








Tuesday 18 January 2022

Coercive control within religious (and other) organisations


A Wolf in Sheep’s Clothing: The Eight Elements of Coercive Control Hiding Behind the Mask of Faith






A guest blog post by Patty Bear.   Shutterstock | Isaac Lugalia Arts

Heresy. The very word ignites our collective psyche with haunting images. Questioners have been burned at the stake both metaphorically and literally for centuries, and toxic faith leaders and organizations count on us to remember this trauma, to carry the memory of the heinous cost of looking behind the mask of faiths.
Of course, not all faith communities are toxic authoritarians wearing a gentle disguise. Some are broadly supportive of their members, encouraging the kind of questioning required to nurture an independent conscience and spiritual maturity. However, if you are reading this article, you have probably begun to question your faith environment, or perhaps even stumbled upon the bared teeth of the wolf behind the disguise. Or maybe, like me, you would describe yourself as having religious PTSD. 
I was raised in a sect of the Plain People of Pennsylvania. As a child, I took in the Church teachings and role modeling of my mother and saw my future clearly—and willingly—without question. Though I wasn’t always comfortable with how women were portrayed in sermons, it wasn’t until my teen years that the drilling of female inferiority and subservience into me was upended. Once I was awakened, the coercive control I’d been living under no longer had a place to hide—but the long-term effects had already taken root. 

When I was growing up, I often heard the phrase from the book of Matthew: “Ye shall know them by their fruits.” Toxic faith organizations are quite good at showcasing a smorgasbord of “shiny fruits,” seemingly polished to perfection. For this reason, I have found that a far better metric for identifying those in sheep’s clothing is recognizing their cunning, stealthy, wolf-like behaviors—the rotten fruits that might be more difficult to spot at first.

After the Korean War, psychologist Albert Biderman studied the methods of coercion and control used against prisoners of war to induce false confessions and to manipulate prisoners to betray their country. Since he first developed the framework, it has been recognized by domestic violence and child abuse experts as the universal toolbox abusers around the world use to systematically take control of their victims. To show how these tactics operate in parallel to many spiritual leaders and faith-based organizations, I have applied Biderman’s eight elements of coercive control below with specific examples of what to look for . . .


The Eight Elements of Coercive Control in Spiritual Settings
1. Isolation
  • The creation of close-knit spiritual communities separating believers from nonbelievers, subtly or unsubtly discouraging intimacy with those outside the “tribe.” 
  • A gender-based hierarchy, often where female members have a lesser status than male members, and sometimes insistence that female members be dependent on male members to be considered “godly.”
  • The lending of assistance to down-on-their-luck individuals who come to believe they can’t survive outside the group. 
  • The requirement of a dress code or uniform that sets members apart from everyone else. 
  • The extinguishing of members’ voices by insisting upon conformity, secrecy, and silence.
  • Requiring followers to give up regular jobs in favour of "Approved jobs" in the organisations money raising businesses
2. Monopolizing Perception
  • A heavy indoctrination process, such as repetitive sermons constantly reinforcing a few select scripture passages, forced scripture memorization, a narrow religious education, and the vilifying or demonizing of otherness.
  • The discrediting of anyone who questions the indoctrination, or the ejection of them from the group as troublemakers. 
  • The discrediting of outsiders and family or friends who question the spiritual group’s beliefs or behavior patterns. 
  • The discouragement or forbidding of secular education or certain types of books, music, and entertainment so that only the “right” beliefs get airtime.
3. Humiliation and Degradation
  • After isolating and monopolizing perception and discrediting others, it remains necessary to discredit the individual themselves or an entire class of people so that they are:
- gradually drained of self-esteem, self-respect, and personal agency 
- weakened in their physical, mental, and emotional ability to resist
- worn down by being treated in demeaning ways, ridiculed for having any needs or independent perceptions, mocked, labeled in derogatory terms, and given subservient tasks 
This can be done by:
- publicly exposing an individual’s vulnerabilities or weaknesses under the guise of prayer, or saving their soul
- targeting individuals for exorcism or ostracism 
- depriving individuals of sleep, meals, or special privileges
- denying individuals participation in group activities, such as kicking them off the mission trip or not inviting them to the group picnic
- demanding members be submissive no matter how badly they are treated
  • This process conditions targeted victims to accept increasingly unacceptable behavior without complaint. In other words, what might have once been shocking behavior becomes normalized.
4. Threats
  • Designed to create anxiety and despair, threats may be overt or subtle, but they are intended to:
- make abusers’ expectations clear
- induce fear of consequences for challenging the authority or erratic behavior of abusive individuals 
- make clear that, “Thou shalt not question ‘God’s’ representatives on earth, as ‘He’ is beyond question,” and therefore so are his representatives and any demands they might voice. 
This might look like:
- passive-aggressive behavior through comments like, “It would be a shame to lose you as a valued leader/member,” or quoting scriptures that make it clear God sees your behavior or questioning as worthy of eternal damnation"
- overt blackmail, such as threatening to expose a perceived sin
- threats or displays of aggression, physical dominance, and violence

5.  Omnipotence, Superiority, or Overwhelming Power
  • Demonstrations of shock and awe, such as performing alleged miracles or claiming to receive visions or special dreams.
  • Overwhelming displays of force or disproportional consequences, such as dramatically ejecting a member from the community for sincere questions, noting hypocrisy in the leadership, or separating family members as punishment 
  • Brutal and/or public scapegoating of a member in a staged powerplay to demonstrate superiority. Making an example of someone. 
  • Open committing of crimes by authority figures.
  • Indulgence in hypocrisies or treating others in ways nobody else could get away with. 
All of this behavior further conditions the acceptance of the unconscionable, serving the purpose of demonstrating the kind of omnipotence that generates a profound sense of futility for anyone in disagreement or who would fight back.

6. Enforcing Trivial Demands
  • Reinforcement of who has the power and who does not by the making of patently silly demands that serve little apparent useful purpose, such as unnecessary manual labor, or making you apologize to your abuser.
  • Communication of no-win messages like answering questions with, “Because God says,” or, “That’s not for you to question,” or, “You just need to have faith.”
7. Induce Exhaustion
  • Expectation of members to attend services or be on committees that interfere with their ordinary life. 
  • Being pressed into service to the group that consumes large amounts of time, leaving little for self-care or reflection.
  • Promote endless striving. One can never do enough, be enough, or be good enough leading members to be drained financially, emotionally, psychologically and mentally. 
  • Encouragement to have more children than women would like or can care for (similar to prisoner of war situations where a prisoner may be deprived of sleep to induce a state of confusion and breakdown). 
  • Promoting double-bind messages requiring members to guard and promote an idealized public image directly contradicted by a harsher private reality of behaviors and the real rules that must be kept secret. Double binds induce a feeling of being crazy and foster mental exhaustion.    
  • Prolonged periods of fasting, prayer, and worship.
  • The discouragement to take prescribed medicines or other therapies, often accompanied by guilt-inducing explanations like one’s faith should be enough to heal or sustain. 
8. Occasional Indulgences
  • The mostly stick, occasional carrot approach provides positive reinforcement for meeting the abuser’s demands. In the study of narcissism, this practice is called “breadcrumbing,” which is intended to:
- tease the person in a perpetual state just barely above starvation level, but perennially hungry so they will seek favor from the abuser
- exacerbate emotional vertigo as the person gets glimpses of an emotional mirage of kindness in a desert of cruelty that keeps them stumbling along, working to “earn” these indulgences and gain some self-esteem
- give the person just enough favor, love, or reward to keep them in the fold or from seeing the perpetrator(s) as a total monster
- reinforce that a person should feel “grateful for what you get” and guilty if they aren’t slavishly appreciative—this indoctrination keeps a person from focusing objectively on how little they are actually given


With all of these tactics in mind, consider that spiritual abusers often spout the phrase, “In God we trust,” yet gradually groom you to shift your trust from yourself and your Divine connection to trusting in them and in their authority. Though they go to great lengths to appear otherworldly, spiritual abusers in faith-based organizations are merely garden-variety thugs who coerce and control like any other abuser. 
For example, when a child has been abused, they are statistically more likely to encounter abuse by others and even into adulthood. It’s no surprise, then, that when a person leaves a toxic faith culture without examination of the coercion they’ve been under, particularly if it’s all they’ve known since childhood, they are almost certain to seek or be lured by another similar faith-based culture in their quest for belonging or certainty. These “faith-based” cultures may have nothing to do with organized religion; instead, they may take the form of a spiritual group led by a guru, a political party, a coaching group, or a multi-level business opportunity, all of which demand unquestioning obedience. This is why coming to awareness of what has been perpetrated on you is essential. Without that understanding, it is nearly impossible to stand in your own authority and forge your own sovereign path. 

What helps to see this more clearly is to recognize that many controlling faith organizations are based on an authoritarian father figure. Therefore, we can understand these cultures in the same way we understand abusive family structures and domestic violence. Domestic violence abusers employ emotional abuse to destabilize and control the way their victims feel by undermining their self-esteem and self-trust, invading the safety of boundaries, and destroying emotional connections to the important people in their lives. They further employ psychological control measures to confuse and destabilize their victim’s thinking and sense of reality through gaslighting, twisting the truth, humiliating, controlling access to independent facts, and discrediting their victim’s own intuition and conscience. Be clear: any abusive grooming process is designed to disarm a person’s natural defenses and demolish any resistance to the totalitarian control desired by the predator. 
Spiritual abuse employs the identical braiding of emotional and psychological abuse, except that it claims for its authority the omnipotent imprimatur of “God’s word” and/or “God’s will.” In this way, spiritual abusers hijack our natural relationship with the Divine or our Higher Self, and claim that power to translate and interpret scriptures to advance their abusive aims, and to provide themselves diplomatic immunity should any accusations arise. In fact, spiritual abuse tactics provide the means for indoctrinating congregations and/or entire segments of the population into a subservient role controlled by those who use “God’s will” in self-serving ways. 
Unfortunately, faith is the perfect Trojan horse for the kind of unquestioning obedience abusers crave, often to further a hidden agenda of bolstering personal ambition, padding bank accounts, justifying sexual proclivities, and feeding an insatiable lust for power. 

Precisely because we have been trained to honor the taboo against questioning, faith-based organizations make the perfect place for abusers and abusive belief structures to flourish unchallenged. However, if we can recognize and demystify the tactics of abusers, we then have the ability to pull off the sheep’s clothing and drain the wolves of their power. 


Patty Bear is an aviator, thinker, wild soul, and author of the recently released memoir From Plain to Plane: My Mennonite Childhood, a National Scandal, and an Unconventional Soar to Freedom and House of the Sun: A Visionary Guide to Parenting in a Complex World with Pat Shannon. In addition to being an author, Patty speaks, coaches, and writes on how the four forces of flight can be a compass for living, and how the stages of the journey of metamorphosis shape our lives and lead each of us to our butterfly destiny. Her mission is to liberate, inspire, and delight. She can be reached at patty@theflyingclub.com, or you can connect with her on FB at https://www.facebook.com/authorPattyBear





Monday 3 January 2022

Drag and Drop behaviour has certainly changed in OSX Monterey 12.0.1

 The Drag and Drop behaviour has certainly changed in Monterey most noticeably in the "Grab and drop" actions.


Factors that demonstrate this issue are:

  • Using list or column view for folders - The select, drag and drop action works, in the same folder with same files when in Icon or preview view modes.
  • Using a trackpad does not work but a magic mouse does work. You can have both plugged in at the same time and see the different behaviours.
  • Accessibility options for pointer System preferences -> Accessibility -> Pointer control -> Trackpad options -> Enable Dragging
  • Drag to move action seems to be a bit intermittent, sometimes works sometimes not.


Note that under "Pointer control" there are sub options "Trackpad options" and Mouse Options but only under trackpad is there an option to Enable Dragging. The Enable dragging choice has With drag lock, Without drag lock and Three finger drag.

Setting The enable dragging choice to Three fingers just upsets Mission control Desktop management. Enable dragging with drag lock seems to work best.



Workaround

When using a trackpad in list or column mode, after selecting the files to move briefly push [alt] key to grab and move the files. The [alt] key will trigger the "copy files on move" action but if you release the alt before dropping the files the action reverts to a move rather than copy (when moving with in the same disk volume).


Other folks have reported that switching off force and Septic feedback fixes this behaviour.


Set the Trackpad option to enable dragging.


Mouse option


Context is Monterey on a Mac mini 2020 and seen on Mac book Air M1.