Daily Dish – 022719

Daily Dish for Thursday 27th February, 2019 
Dispute The Text


Facebook and Telegram Are Hoping to Succeed Where Bitcoin Failed [nyt/27]  The messaging companies have a reach that dwarfs the backers of earlier cryptocurrencies. Facebook and Telegram can make the digital wallets used for cryptocurrencies available, in an instant, to hundreds of millions of users.  Meanwhile back in Irie … Facebook Faces 10 Privacy Probes in Ireland as Global Scrutiny Intensifies [wsj /38] and gangster style Facebook wants up to 30% of fan subscriptions vs Patreon’s 5% [techcrunch 18]  Patreon, which now has 3 million patrons who’ll pay 100,000 artists, comedians, models and makers more than $500 million this year.

AT&T Weighs Combining HBO, Turner Units [wsj /37/paywall] Veteran television executive and producer Robert Greenblatt is in advanced talks withAT&T Inc. to take a senior role at WarnerMedia that could include oversight of a new unit that would combine HBO and Turner entertainment networks and an upcoming streaming service, people familiar with the matter said. The priority of AT&T is to get its as-yet-unnamed direct-to-consumer streaming service up and running. AT&T has said that HBO Now, the premium channel’s own streaming service, will be the centerpiece of that effort.

How fashion tripped over the hip-hop economy [ft /10/paywall]  There is an expression within the black community — “twice as good.” Parents say it to their children to explain that you’ll have to be twice as hardworking, twice as talented, twice as ambitious to get what white people have. We see it across fashion. In Prada’s response, and the decision to look to black figures who are already celebrated, busy and removed from the hierarchies of fashion, we are reminded that the bar is held higher for black creatives.

Twitter threadEugene Wei on social capital.   “We’re at the end of the first era of social networks. They’ve been fun and useful and toxic all at once. To fix the problems from this first era will require modeling users as status-seeking monkeys from the start. We’ve met the enemy, and it is us. /FIN”


Policy Principles for a Federal Data Privacy Framework in the United States   Archived Webcast from 2/27 [senate.gov /6]  “In an age of rapid innovation in technology, consumers need transparency in how their data is collected and used,” said Wicker. “It is this committee’s responsibility and obligation to develop a federal privacy standard to protect consumers without stifling innovation, investment, or competition. As we continue to examine this critically important issue, I hope this first hearing will offer valuable insights that will help set the stage for meaningful bipartisan legislation.”

Closing comments by Jan Kleijssen, 27 February 2019, Helsinki [coe.int /2] High-level Conference: Governing the Game Changer – Impacts of artificial intelligence development on Human Rights, Democracy and the Rule of Law…To ensure respect for human rights and core values, we need oversight mechanisms with strong mandates and enforcement capacities. Robust risk assessment processes must lead to the effective implementation of precautionary measures, if citizens are to trust that expressed commitments will be upheld. These are big challenges and we need to continue close international collaboration and sharing of knowledge, understanding and practices to meet them.

In Favor of Developing Ethical Best Practices in AI Research  [stanford /8] Of course, academic research in AI has a set of issues and concerns unique to it that these general codes of ethics for technology and computing professional may not address. Fortunately, substantial effort has been put into addressing this area as well. In particular, “ETHICALLY ALIGNED DESIGN – a Vision for Prioritizing Human Well-being with Autonomous and Intelligent Systems” by the IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems and the ASILOMAR AI Principles by the Future of Life Institute both provide concrete recommendations for AI researchers. Last but not least, researchers should be familiar with the codes of conducts at their universities and professional events they attend. Not all AI conferences have explicit codes of conduct, so a good baseline to be aware of is the NeurIPS 2018 code of conduct. Likewise, the NeurIPS affiliated ML Ally pledge is worth reading and thinking about.

Beyond Local Pattern Matching: Recent Advances in Machine Reading [stanford.edu /8] In today’s age of information explosion, when too much new knowledge is generated every day in text (among other modalities) for any single person to digest, enabling machines to read large amounts of text and answer questions for us is one of the most crucial and practical tasks in the field of natural language understanding. Solving the task of machine reading, or question answering, will lay an important cornerstone towards a powerful and knowledgeable AI system like the librarian in the movie Time Machine:

Reconstructing meaning from bits of information [nature /13] . Here, we demonstrate using functional MRI (fMRI) that the brain combines bits of information into meaningful object representations. Participants receive clues of individual objects in form of three isolated semantic features, given as verbal descriptions. We use machine-learning-based neural decoding to learn a mapping between individual semantic features and BOLD activation patterns.

note:  Looking for a word press design person please get in touch 


Privacy is Power

Daily Dish 022719

Daily Dish for Wednesday 27th February, 2019 
Dispute The Text

Amazon Personalize – Real-time personalization and recommendation, based on the same technology used at Amazon.com  [aws/ 5]  With Amazon Personalize, you provide an activity stream from your application – page views, signups, purchases, and so forth – as well as an inventory of the items you want to recommend, such as articles, products, videos, or music. You can also choose to provide Amazon Personalize with additional demographic information from your users such as age, or geographic location. Amazon Personalize will process and examine the data, identify what is meaningful, select the right algorithms, and train and optimize a personalization model that is customized for your data.

Status as a Service (SaaS) [eugenewei.com /9] I think network effects are great, but in a sense they’re a little overrated. The problem with network effects is they unwind just as fast. And so they’re great while they last, but when they reverse, they reverse viciously. Go ask the MySpace guys how their network effect is going. Network effects can create a very strong position, for obvious reasons. But in another sense, it’s a very weak position to be in. Because if it cracks, you just unravel. I always worry when a company thinks the answer is just network effects. How durable are they?

@bethmsemel  #AICantFixThis – Threaded read  ... What alternative models of computing is MIT trying to prevent today? The CoC has appeared precisely at a time when critical perspectives of computing are coming to the fore- precisely at the time of #techwontbuildit and @Data4BlackLives#AICantFixThis

Spotify launches in India: Ad-supported free tier and $1.67 monthly subscription [spotify / 3] launch comes on the heels of our recent expansion across MENA and Southeast Asia, bringing the total number of Spotify markets to seventy-nine. Spotify now has more than 200 million users, including more than 96 million subscribers.

How Listening To Music Impairs Creativity  [eurekalert.org /8] video . – The popular view that music enhances creativity has been challenged by researchers who say it has the opposite effect. Psychologists investigated the impact of background music on performance by presenting people with verbal insight problems that are believed to tap creativity. They found that background music ‘significantly impaired’ people’s ability to complete tasks testing verbal creativity — but there was no effect for background library noise

Surveillance Cameras [eff /0] Recognizing the Types of Cameras – Here is a visual guide to some of the types of surveillance cameras you may encounter day-to-day. This is not an exhaustive list, and it’s important to note that some cameras may incorporate multiple features described below.

Are Robots Competing for Your Job? [newyorker / 59!] Futurists foretell inevitable outcomes by conjuring up inevitable pasts. People who are in the business of selling predictions need to present the past as predictable—the ground truth, the test case. Machines are more predictable than people, and in histories written by futurists the machines just keep coming; depicting their march as unstoppable certifies the futurists’ predictions. But machines don’t just keep coming. They are funded, invented, built, sold, bought, and used by people who could just as easily not fund, invent, build, sell, buy, and use them. Machines don’t drive history; people do.

Swiss Cybervoting – source code being shared wide after DMCA takedown –  e-voting source code

russiaifyourelistening.com Single serve site

Daily Dish 022619

Daily Dish for Tuesday 26th February, 2019 
Dispute The Text


Apple and Facebook Fighting International Encryption Battle [wsj /37] The so-called going-dark issue, or the government’s inability to access data as devices get more encoded and difficult to crack, “is a problem [that] infects law enforcement and the intelligence community more and more so every day,” said Amy Hess, executive assistant director with the FBI, in an interview. Ms. Hess, who previously oversaw the FBI’s science and technology branch, testified to Congress on the problem during Apple’s 2016 clash with the bureau.

Huawei Frightens Europe’s Data Protectors. America Does, Too  [bloomberg /33] “I don’t mean to compare U.S. and Chinese laws, because obviously they aren’t the same, but what we see is that on both sides, Chinese and American, there is clearly a push to have extraterritorial access to data,” Laure de la Raudiere, a French lawmaker who co-heads a parliamentary cyber-security and sovereignty group, said in an interview. “This must be a wake up call for Europe to accelerate its own, sovereign offer in the data sector.”

Over 8,000 marijuana convictions in San Francisco dismissed with help from a computer algorithm [CNN / 29 ]
While sifting manually through thousands of court records would have been time-consuming, the development of the algorithm cut the process down to minutes. “Using technology, we have been able to proactively bring greater racial equity and fairness to marijuana legalization in California,” Gascón said in a press release Monday. “I am thrilled to see other counties and states following suit by offering similar relief in their communities. It’s the right thing to do.”

Daily Dish 022519

Daily Dish  Monday 24th,  February MMXIX
–  Dispute The Text –

Late City Final

Why tech giants are interested in regulating facial recognition [nextweb / 6]  Therefore, while recording video is a privacy problem, having tools that could search through all that video with the speed of state-of-the-art facial recognition algorithms adds new concerns. For instance, consider Amazon’s drive to put its facial recognition technology to smart home security cameras. Should this happen, people who pass by a Rekognition-enhanced camera will not only have their faces recorded by the camera, but will also have their metadata uploaded into Amazon’s cloud. This means the company will have a searchable directory of movements and locations linked to people’s profiles, which it can then use for advertising purposes (or more evil goals).

Are you being scanned? How facial recognition technology follows you, even as you shop [theguardian /7] Retail companies are increasingly turning to facial detection and facial recognition software to attract and engage a distracted audience. Quividi’s host of international clients include Telstra, 7-Eleven, Coca-Cola, oOH Media and HSBC bank. Terry Hartmann, vice president of Cognitec Asia Pacific, the company that develops “market-leading face recognition technologies for customers and government agencies around the world”, says using facial detection commercially is no different to Facebook’s manipulation of users’ online search history for targeted advertising.

The real reason why Facebook and Google won’t change [fastcompany /16] Occasionally we catch an unobstructed view of radical indifference. In an internal Facebook memo from 2016, leaked last spring, Andrew Bosworth, one of Zuckerberg’s closest advisers, explained that “connection” needs to be understood as an economic imperative, whether it enhances users’ lives or threatens them. “We connect people,” he wrote. “Maybe someone finds love . . . Maybe someone dies in a terrorist attack coordinated on our tools. The ugly truth is that . . . anything that allows us to connect more people more often is de facto good.”

Understanding Facial Detection, Characterization, and Recognition Technologies and Privacy Principles for Facial Recognition Technology in Commercial Applications  [fpf.org /1]  From 2018Important to distinguish between facial detection vs facial recognition  

The Privacy Principles Include:

  • Consent
  • Use – Respect for Context
  • Transparency
  • Data Security
  • Privacy by Design
  • Integrity and Access
  • Accountability


ICANN Calls for DNSSEC for All Domains Following Domain Hijacking Attempts  [ICANN /2]In the context of increasing reports of malicious activity targeting the DNS infrastructure, ICANN is calling for full deployment of the Domain Name System Security Extensions (DNSSEC) across all unsecured domain names. The organization also reaffirms its commitment to engage in collaborative efforts to ensure the security, stability and resiliency of the Internet’s global identifier systems.  As one of many entities engaged in the decentralized management of the Internet, ICANN is specifically responsible for coordinating the top-most level of the DNS to ensure its stable and secure operation and universal resolvability.

LIVE CA Assembly Privacy Committee 9AM PT Agenda

LIVE: ICANN and the New Top-Level Domains   1:30-5:30   [youtube  / ] We are in the midst of an historic expansion of internet domain names with more than 1200 new generic top-level domains (“gTLDs”) now competing with <.com>. This 5000% increase in gTLDs is the biggest change to the internet’s domain naming system in thirty years (and more are coming soon!). Accompanying these new gTLDs, are new and innovative–but little known–IP rights protection mechanisms. These developments could have a profound impact on the rights of IP owners, domain name registrants, and the public, and on the architecture of the internet. Agenda [american.edu /2]

ARTS: “Jasper Johns: Recent Paintings & Works on Paper,”  at Matthew Marks Gallery through April 6.  While regarding the works at the opening I was missing all of this context – NY review of Books  (and article about the fellow in the paintings)

Daily Dish 022419

Daily Dish  Sunday 24th,  February MMXIX
–  Dispute The Text –

Sunday Focus .US .CN Recent AI Papers and Strategy Documents

AI Now 2018 Report (PDF) on the state of AI + 10 recommendations [medium.com /1] for the field. – The AI accountability gap is growing: The technology scandals of 2018 have shown that the gap between those who develop and profit from AI—and those most likely to suffer the consequences of its negative effects—is growing larger, not smaller. There are several reasons for this, including a lack of government regulation, a highly concentrated AI sector, insufficient governance structures within technology companies, power asymmetries between companies and the people they serve, and a stark cultural divide between the engineering cohort responsible for technical research, and the vastly diverse populations where AI systems are deployed. These gaps are producing growing concern about bias, discrimination, due process, liability, and overall responsibility for harm. This report emphasizes the urgent need for stronger, sector-specific research and regulation

Executive Order on Maintaining American Leadership in Artificial Intelligence  [whitehouse /0]  US Executive Order  Policy and Principles.  Artificial Intelligence (AI) promises to drive growth of the United States economy, enhance our economic and national security, and improve our quality of life. The United States is the world leader in AI research and development (R&D) and deployment.  Continued American leadership in AI is of paramount importance to maintaining the economic and national security of the United States and to shaping the global evolution of AI in a manner consistent with our Nation’s values, policies, and priorities.

Summary of the 2018 Department of Defense Artificial Intelligence Strategy (PDF) DOD Summary Of The 2018 Department Of Defense Artificial Intelligence Strategy – Harnessing Ai To Advance Our Security And Prosperity- -Realizing this vision requires identifying appropriate use cases for AI across DoD, rapidly piloting solutions, and scaling successes across our enterprise. The 2018 DoD AI Strategy, summarized here, will drive the urgency, scale, and unity of effort needed to navigate this transformation. The Joint Artificial Intelligence Center (JAIC) is the focal point for carrying it out. As we systematically explore AI’s full potential, study its implications, and begin the process of learning about its impact on defense, we will remain thoughtful and adaptive in our execution

Center for a New American Security [cnas.org /0] Report. China’s behavior of aggressively developing, utilizing, and exporting increasingly autonomous robotic weapons and surveillance AI technology runs counter to China’s stated goals of avoiding an AI arms race. However, this by itself does not necessarily mean that Chinese officials are being insincere in their expressions of concern about such arms races. Lamenting arms race dynamics while aggressively participating in them is a common story in the history of international relations

A Next Generation Artificial Intelligence Development Plan  [China Copyright and Media/ 0] – The rapid development of artificial intelligence (AI) will profoundly change human society and life and change the world. To seize the major strategic opportunity for the development of AI, to build China’s first-mover advantage in the development of AI, to accelerate the construction of an innovative nation and global power in science and technology, in accordance with the requirements of the CCP Central Committee and the State Council, this plan has been formulated.

The Cold War in Tech Is Real and Investors Can’t Ignore It [Barrons/6/firewall] The BATS –Baidu (BIDU), Alibaba Group Holding (BABA), and Tencent Holdings (700.Hong Kong) dominate every aspect of the internet in China and drive much of the nation’s innovation. The companies have made aggressive pushes into digital payments, AI, and autonomous vehicles. But their reach extends well beyond China. —- Huawei has spent several years challenging the established network infrastructure players like Cisco, Nokia, Ericsson (ERIC), Ciena (CIEN), and Juniper Networks (JNPR). Any move away from Huawei, therefore, would benefit these companies. Their routing and switching gear sit in the core of telecom networks where traffic is aggregated—the very area that intelligence experts fear could be targeted by Chinese spyware.




Daily Dish 022319

Daily Dish  Sat 23rd,  February MMXIX
–  Dispute The Text –

Do Not Disturb: How I Ditched My Phone and Unbroke My Brain [nyt/7] I look people in the eye and listen when they talk. I ride the elevator empty-handed. And when I get sucked into my phone, I notice and self-correct.  It’s not a full recovery, and I’ll have to stay vigilant. But for the first time in a long time, I’m starting to feel like a human again. (over two years sans phone in my day-to-day FTW -ed)

2019 Edelman Trust Barometer.(pdf) Special Report: California – 94% of Tech Workers agree tech companies have an obligation to protect their users’ data – 57%  Lack of privacy/my data is shared too much – 44% Trust marijuana dispensaries more than social media companies (33%)

Cigna’s Algorithms Aim to Predict Opioid Abuse [wsj/2/firewall] Machine learning and predictive analytics is helping the health insurance company identify customers likely to overdose  A combination of 16 datasets are used to inform the algorithms, including data about patients’ behavioral health claims, chronic disease history and interactions with pharmacies. The algorithms were built with the help of in-house staff.  When the patients are identified, a behavioral case manager reaches out to them.  (o hai we think  you are going to on drugs or already are how can we help  – ED)

Gathering Intelligence: Drifting Meaning and the Modern Surveillance Apparatus.  (pdf) This Article proceeds in five parts. In Part I, we provide a brief history of Executive Order 12333 and the statutory landscape of the United States’ surveillance architecture; we also describe the critical differences between the statutes and the executive order. The Foreign Intelligence Surveillance Act and the 2008 FISA Amendments Act not only govern certain, substantive aspects of foreign intelligence surveillance, limiting what is left to the responsibilities created by Executive Order 12333 – they instill a degree of clarity into the entire surveillance architecture that is absent from portions that fall under Executive Order 12333 guidance. In Part II, we introduce the agency manuals that implement Executive Order 12333 and examine the process whereby they may be altered and changed; in doing so, we demonstrate the dispersion of authority across the executive branch and show how actors within the executive branch are able to revise essential procedures, largely without notice.

Life and society are increasingly governed by numbers [economist/7] . “In the age of the metric society,” writes Mr Mau, “individuals constitute bundles of data in which their personal worth is encoded.” When different sources of data are linked together, it becomes possible to paint an eerily complete picture of a person, and to predict with some accuracy both their net worth and their future behaviour.

Cameras that understand: portrait mode and Google Lens [ben-evans/1] The alternative approach, as for Shazam, is to go vertical. Suppose there was an app that you could wave at a recipe in a book, that would generate a shopping list or maybe give you nutrition information. You could make that really reliable and you would have no ‘AI discoverability’ problem at all, but the app itself would have a discovery problem (even if it was from Google) – how would people find out about it? Either way, this approach isn’t workable for Google (or Amazon) – if they can recognise 50 categories now and 200 in two years, they can’t have 200 apps or 200 modes in the camera app any more than they can have 200 modes on the search page. You need either to have a general purpose front end or make the whole thing passive or invisible (face recognition, HDR, putting flight details into your calendar).

Humanity + AI: Better Together   So the counter-narrative I want to offer to the mainstream, front page accounts is that with careful, thoughtful, empathic design, we can enable ourselves to live longer, safer lives. We can create jobs where we are doing more creative work. We can understand each other better.But before I get to the many, many examples of where this is already happening today, let me share what’s happening in the AI ecosystem more broadly. (another perspective or narrative for sure –  ed)

Daily Dish 022219 (media ownership focus)

Daily Dish  Friday 22nd,  February MMXIX
–  Dispute The Text –

media ownership

Schumer questions hedge fund president about proposed Gannett purchase [washingtonpost (19)] Schumer on Thursday wrote to a hedge fund president who is pursuing a hostile takeover of Gannett, saying he is concerned that the company had made no commitment to “maintain newsroom staffing and ensure Gannett’s newspapers can continue to create high quality local journalism in their communities.” … “unwilling to publicly provide relevant details regarding the proposed acquisition,”

How an Investigation of Fake FCC Comments Snared a Prominent D.C. Media Firm  [gizmodo (23)] Ajit Pai has plenty of accounting to do on so many fronts.  I remember at the time searching the comments for net neutrality finding ones from potus replete with the white house address and typos. – ED

FCC Looks At Local Ownership Rule  [tvtechnology (15)]   The commission in the NPRM requested comment on whether changes in the television marketplace and the video programming distribution industry necessitate elimination, modification or retention of the current rule File comments in MB Docket No. 18-349 at www.fcc.gov/ecfs/

WGA East Blasts FCC Proposal To Ease Rules On Dual Ownership Of Local TV Stations [deadline (29)] “Further consolidation of local radio and television station ownership would rob local communities of their access to serious journalistic engagement with local political, cultural, and business leaders, and to robust coverage of the issues that affect their daily lives,” WGA East executive director Lowell Peterson said in a letter to the FCC.

Detecting duplicate content in American talk radio  [medium (1)]


You Give Apps Sensitive Personal Information. Then They Tell Facebook.   [wsj (2)] Some privacy experts who reviewed the Journal’s findings said the practices may be in violation of that law. “For the sensitive data, companies basically always need consent—likely both the app developer and Facebook,” said Frederik J. Zuiderveen Borgesius, a law professor at Radboud University in the Netherlands

China Uses DNA to Track Its People. It Got Help From the U.S. [nyt ( 7)] The Chinese authorities turned to an American company and a prominent Yale researcher as they built an enormous system of surveillance and control.

Privacy advocate held at gunpoint after license plate reader mistake, lawsuit alleges



Xinhua’s new female AI  anchor, the male anchor can now broadcast news in a standing position, with more body language [youtube ( ) ]

Cisco’s annual Visual Networking Index report (pdf)

Daily Dish 022119

Daily Dish  Thursday 21st,  February MMXIX
–  Dispute The Text –

whichfaceisreal.com (whichfaceisreal/4)  Click on the person who is real.

Micropayments on Twitter  (Tippin.me/5)Receive tips and micro-payments everywhere with this Lightning Network wallet. Cash out anytime.

China’s social credit system shows its teeth, banning millions from taking flights, trains (scmp/23) Over 3.59 million Chinese enterprises were added to the official creditworthiness blacklist last year, banning them from a series of activities, including bidding on projects, accessing security markets, taking part in land auctions and issuing corporate bonds, according to the 2018 annual report released by the National Public Credit Information Centre. About 17.46 million “discredited” people were restricted from buying plane tickets and 5.47 million were restricted from purchasing high-speed train tickets, the report said.

Investment Firm Behind “Fearless Girl” Sues Artist for Unauthorized Replicas    (hyperallergic/ 14)  But despite SSGA’s claims of empowerment, the company has a history of keeping women and minorities down. In 2017, the firm agreed to pay $5 million to more than 300 women and 15 Black employees in senior positions who received substantially less pay than their white male colleagues, according to a 2012 audit. Per the settlement’s terms of agreement, though, the payout did not “constitute an admission or denial by State Street of any violation.” Bloomberg also reports that the company typically votes against shareholder proposals related to gender pay. And just last year, SSGA received a low rating for the diversity of its gender equality fund. Ironically, “Fearless Girl” was initially deployed as a marketing stunt for the firm’s gender diversity fund before taking on a life of its own.

Once hailed as unhackable, blockchains are now getting hacked   [MIT Technology Review / 22 ] More and more security holes are appearing in cryptocurrency and smart contract platforms, and some are fundamental to the way they were built.

 Nyet on smartphones. The Russian Army has banned soldiers from using smartphones, citing the need to protect military information, BBC News reports. Shorter: Smartphones (and their users) bleed data, including GPS coordinates.

Daily Dish 022019

Daily Dish  Wednesday 20th,  February MMXIX
–  Dispute The Text –

U.S. Privacy Debate Centers Around State, National Standards [wsj / 33 ]  A “surprising” rift. Democrats are signaling opposition to any bill pre-empting state laws—including California’s 2018 law, which broadens the definition of personal information and gives consumers the right to prevent their data from being sold. Silicon Valley and its Republican allies are pushing for a national standard that would override state regulations.  Meanwhile… The gridlock comes as federal regulators such as the FTC begin to take stronger action. And in the U.K., concerns about privacy in the wake of the Cambridge Analytica scandal have prompted more cries for regulation.

Glass houses: how much privacy can city-dwellers expect? [theguardian.com / 14] And of course the line moves, as cities become less private than they used to be. Seeing more people means more people can see you, including the city authorities. Your swipe card keeps track of your movements around a public transport system, and you will usually be filmed in buses or trains, and in the station. If you drive, you’ll probably be recorded by traffic cameras, congestion charge cameras, car park cameras. In New York, the Citibike scheme shares its journey data publicly, including the gender of each cyclist, and their year of birth. And of course there’s Google, which regularly photographs your home, both from the street and from the sky, and makes the pictures available online. In many Chinese cities, and even in villages, your face could be photographed, recognised and monitored by the government’s Sharp Eyes programme.

“Hollywood is now irrelevant,” says IAC Chairman Barry Diller [recode.com / 30 ] predicted Disney would only do “okay in streaming” when it launches its streaming service Disney Plus later this year. In general, he advised, “those who chase Netflix are fools.” “Netflix has won this game,” he said. “I mean, short of some existential event, it is Netflix’s. No one can get, I believe, to their level of subscribers, which gives them real dominance.” And that includes its closest rival Amazon Prime, which isn’t designed to bid as aggressively on tomorrow’s media stars as Netflix is.

Augmented Faces API  [googleblog /  6 ] ARCore’s new Augmented Faces API (available on the front-facing camera) offers a high quality, 468-point 3D mesh that lets users attach fun effects to their faces. From animated masks, glasses, and virtual hats to skin retouching, the mesh provides coordinates and region specific anchors that make it possible to add these delightful effects.

Learning to live together  [eflux / 5]  Driverless vehicles aren’t just about cars. Rather, they are more akin to the interaction between a government and a governed citizenry. Modern government is the outcome of an implicit agreement — or social contract— between the ruled and their rulers, which aims to fulfil the general will of citizens. If the Enlightenment marked humanity’s transition towards the modern social contract, then determining a sensorial agreement could serve as the first step towards cohabitation between humans and non-human entities. Interconnected sensors and HD maps can create a new common, ubiquitous global sensorium that further dissolves the distinction between nature and artifice. A sensorial social contract embeds the judgment of society, as a whole, in the sensorial governance of societal outcomes.

Google admits error over hidden microphone [bbc.com /10 ]  “If I owned one of these things and found out that the world’s biggest advertising company hid a microphone in my home for a year, I’d be livid.” UK-based privacy campaign group Big Brother Watch added: “Many of our worries about smart home devices appear to be proving true… Google should be held to account for wrongly advertising this product.” Nest Guard went on sale in the US last year as part of Google’s Secure alarm system. A European and Canadian release is also planned but has yet to occur.  Nest, a company known for its smart thermostat, was acquired by Google in February 2014, for a reported $3.2bn (£2.5bn). The acknowledgment comes days after Singapore Airlines faced criticism for installing cameras into the backs of some of its planes’ seats as part of a new in-flight entertainment system.

When surveillance meets incompetence [Techcrunch.com /  21]  The security lapse was discovered by Victor Gevers at the GDI Foundation, a security organization working in the public’s interest. Using the infamous but useful Shodan search engine, he found a MongoDB instance owned by the Chinese company SenseNets that stored an ever-increasing number of data points from a facial recognition system apparently at least partially operated by the Chinese government. Many of the targets of this system were Uyghur Muslims, an ethnic and religious minority in China that the country has persecuted in what it considers secrecy, isolating them in remote provinces in what amount to religious gulags.

NY Police Union Can’t Stop Release of Body-Cam Video  We find that given its nature and use, the body-worn-camera footage at issue is not a personnel record covered by the confidentiality and disclosure requirements of § 50-a (see Matter of Prisoners’ Legal Servs. of N.Y. v New York State Dept. of Correctional Servs., 73 NY2d 26, 32 [1988]). The purpose of body-worn-camera footage is for use in the service of other key objectives of the program, such as transparency, accountability, and public trust-building.

OnionShare 2 adds anonymous dropboxes, supports new Tor addresses, and is translated into a dozen new languages  [ micahflee.com / 0 ] Unlike services like email, Google Drive, DropBox, WeTransfer, or nearly any other way people typically send files to each other, when you use OnionShare you don’t give any companies access to the files that you’re sharing. So long as you share the unguessable web address in a secure way (like pasting it in an encrypted messaging app), no one but you and the person you’re sharing with can access your files.

Childhood’s End – The digital revolution isn’t over but has turned into something else [edge.com / 5 ] Nature’s answer to those who sought to control nature through programmable machines is to allow us to build machines whose nature is beyond programmable control.

Password Managers: Under the Hood of Secrets Management . [ securityevaluators.com / 5  ] Password managers allow the storage and retrieval of sensitive information from an encrypted database. Users rely on them to provide better security guarantees against trivial exfiltration than alternative ways of storing passwords, such as an unsecured flat text file.

-- Format note--  story links now use this format: [source/# of trackers/paywall note if applicable] so [Wired/54] means the article is published by wired.com + number of trackers for that page is 54 (based on privacy badger) to help inform your click deeper - ED --




Daily Dish 021919

Daily Dish Tuesday 19 February MMXIX
–  Dispute The Text –

Govt. to access home devices in security survey [nhk.or.jp / 0] Japan will attempt to access Internet-connected devices in homes and offices to find their vulnerabilities. The first-of-its-kind survey is aimed at beefing up cyber-security.   (nation wide device polling for natsec, wow -ED)

A faster, more efficient cryptocurrency [mit.edu / 4] In experiments, Vault reduced the bandwidth for joining its network by 99 percent compared to Bitcoin and 90 percent compared to Ethereum, which is considered one of today’s most efficient cryptocurrencies. Importantly, Vault still ensures that all nodes validate all transactions, providing tight security equal to its existing counterparts.

The Imperfect Truth About Finding Facts In A World Of Fakes [wired.com / 34 ] An effective identification system, however, carries with it a worrisome truth: Every verification method carries the threat of surveillance. There are ways to mitigate this concern. We can develop schemes that protect identities or reveal as much as necessary in a given context—and then secure the evidence proving the authenticity after a person has been verified. Also, we need to make sure verification is a choice, not an obligation.

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on copyright in the Digital Single Market (Text with EEA relevance) (PDF)

Responding to Cognitive Security Challenges [stratcomcoe.org / 3] See section 6 Countering Subversion Online: what role for public policy? This Slide is a good start.

Should We Treat Data as Labor? Moving Beyond “Free”  [ssrn.com / 4]  In this paper, we explore whether and how treating the market for data like a labor market could serve as a radical market that is practical in the near term.

How did the police know you were near a crime scene? Google told them  [mprnews.org / 16 ] “Understanding how these geographical areas are targeted is completely central to determining whether these searches are constitutional,” said Wessler, who argued a landmark cellphone location data case before the U.S. Supreme Court. “In some cases, I think some judges would be alarmed if they were told exactly what they’re signing off to here,” said Ryan Pacyga, an attorney representing one of the accused defendants in the Eden Prairie home invasion case.

worldwideweb.cern.ch [cern.ch / ] the original NeXT web browser has been replicated using modern web technologies (currently too popular to stay up online – ed)

Augmented Faces API  [Google.com /  6] ARCore’s new Augmented Faces API (available on the front-facing camera) offers a high quality, 468-point 3D mesh that lets users attach fun effects to their faces. From animated masks, glasses, and virtual hats to skin retouching, the mesh provides coordinates and region specific anchors that make it possible to add these delightful effects.

We’re All Lonely Together [kottke.org / 8] We’re living in an age of unprecedented connectedness, but more and more people report being lonely on a regular basis. (this is an area that only we can solve for, technology is a scissor, glass a mirror both working against us being connected properly – highest bit rate – eye-t0-eye. – ED)

I Have a Feeling We’re Not in New York Anymore [nymag.com / 19] Hudson Yards is a billionaire’s fantasy city and you never have to leave —  Doctoroff, now CEO of the urban tech company Sidewalk Labs, looks approvingly out at the site from his office at 10 Hudson Yards. “It’s in a long line of great spaces that will define this city, consistent with what we envisioned,” he says. “The basic principles haven’t changed.”  And no park should be forced to share its debut with the development’s preposterous centerpiece, an Instagram-ready tchotchke, 15 stories high and, at $200 million, as costly as a regional hospital. Heatherwick’s Vessel mushrooms up and out over the central plaza, inviting visitors to climb it, watch others climb it, or take an elevator up to a landing, then come back down. The advance hype doesn’t prepare you for a structure quite this large, shiny, and extravagantly pointless.

-- Format note--  story links now use this format: [source/# of trackers/paywall note if applicable] so [Wired/54] means the article is published by wired.com + number of trackers for that page is 54 (based on privacy badger) to help inform your click deeper - ED --