A Privacy-Focused Vision for Social Networking [fb/2] I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won’t stick around forever. This is the future I hope we will help bring about. We plan to build this the way we’ve developed WhatsApp: focus on the most fundamental and private use case — messaging — make it as secure as possible, and then build more ways for people to interact on top of that, including calls, video chats, groups, stories, businesses, payments, commerce, and ultimately a platform for many other kinds of private services. (This is so laughable its insane – Trust them with your crypto keys AYOR, the reasoning for combined messaging isn’t singular UX driven- its a regulation avoiding feature that sets things deeper, darker and at the same time – the table for their crypto coin – ED
Move Fast And Build Solidarity [thenation/20] Activism at Google and Amazon paid off. But can the emerging “tech left” forge long-term alliances between janitors, drivers, and engineers? – A major challenge for the emerging tech-labor movement today happens to be its biggest advantage as well: The definition of a “tech worker” is broad, almost to the point of being meaningless. Working “in tech” could conceivably mean doing anything on the Internet, or with computers or smartphones or anything that plugs into a wall. This, in turn, means there are far more potential recruits for the labor movement. But while software engineers and Uber drivers may get their paychecks from the same pot of corporate money, their experiences, problems, and approaches to solving them aren’t necessarily aligned.
Degenerate Feedback Loops in Recommender Systems [arxiv/0] Machine learning is used extensively in recommender systems deployed in products. The decisions made by these systems can influence user beliefs and preferences which in turn affect the feedback the learning system receives – thus creating a feedback loop. This phenomenon can give rise to the so-called “echo chambers” or “filter bubbles” that have user and societal implications. In this paper, we provide a novel theoretical analysis that examines both the role of user dynamics and the behavior of recommender systems, disentangling the echo chamber from the filter bubble effect. In addition, we offer practical solutions to slow down system degeneracy. Our study contributes toward understanding and developing solutions to commonly cited issues in the complex temporal scenario, an area that is still largely unexplored. (tl/tr recommendation is broken and its hostile -ed)
There’s no such thing as a “tech person” in the age of AI [techreview /23] That so-called dominating technology is artificial intelligence. Its sudden rise has already permeated every aspect of our lives, transforming our social, political, and economic systems. We no longer live in a society that reflects our old, manufactured separations. To catch up, we need to restructure the way we learn and work.
ghidra-sre.org [download] Ghidra is a software reverse engineering (SRE) framework developed by NSA’s Research Directorate for NSA’s cybersecurity mission. It helps analyze malicious code and malware like viruses, and can give cybersecurity professionals a better understanding of potential vulnerabilities in their networks and systems. NSA will be making Ghidra available to the public as an open source release in time for its first public demonstration at the 2019 RSA Conference this March. For more NSA releases, check 0ut CODE.NSA.GOV for open source, and NSA’s Technology Transfer Program for other technology. Related Ghidra opens up JDWP in debug mode listening on port 18001, you can use it to execute code remotely (palm to face emoji) .. to fix change line 150 of support/launch.sh from * to 127.0.0.1
Study: Facing the Future of Surveillance -The Constitution Project’s Task Force On Facial Recognition Surveillance [pogo.org / 2] The importance of limiting government access to the private lives of citizens is highest for sensitive information. But quantity of information can raise its own privacy issues. In Carpenter, the Court highlighted that “a cell phone—almost a feature of human anatomy—tracks nearly exactly the movements of its owner,” and therefore presents heightened risks to privacy.50 While cell phones may have become an extension of our bodies, our faces require no such metaphor; unlike cellphones, our faces are never able to be turned off, left behind, or cast aside. If our faces can be subjected to the same type of continuous surveillance as cellphones, strong limits on surveillance technology will be necessary to properly rebalance power between the government and the people.