132 Matching Annotations
  1. Jul 2020
    1. Besides, this will just end up being reported as a security bug to the security list if left as is, cause docker will eat up all your disk space due to a single call site flooding STDERR forcing logs to grow forever.
    1. Creating and calling a default proc is a waste of time, and Cramming everything into one line using tortured constructs doesn't make the code more efficient--it just makes the code harder to understand.

      The nature of this "answer" is a comment in response to another answer. But because of the limitations SO puts on comments (very short length, no multi-line code snippets), comment feature could not actually be used, so this user resorted to "abusing" answer feature to post their comment instead.

      See

    1. Arrays are not sets. Trying to treat them as if they are is an error, and will create subtle problems. What should be the result of the following operations? [1, 1] | [1] [1] | [1, 1] Of course, there are more interesting examples. These two are to get you started. I don't care what the results currently are. I don't care what you think they should be. I can present extremely strong arguments for various answers. For this reason, I believe that #| is an ill-defined concept. Generalizing an ill-defined concept is a world of pain. If you insist on treating objects of one class as if they were members of a different class, there should be bumps in the road to at least warn you that maybe this is a bad idea. I'm not going to argue that we should remove or deprecate #|. I don't think of myself as a fanatic. But encouraging this sort of abuse of the type system just creates problems.
  2. Jun 2020
    1. “The alarming truth,” warned the researcher, “is that the average number of permissions requested by a flashlight app is 25.”
    2. “Asking for too many permissions is dangerous,” ESET malware researcher Lukas Stefanko explains. “These permissions can be misused as an exploit to access more device components, such as call logs, phone numbers, and browsing history.”
    3. At the heart of Google’s challenge has been so-called permission abuse—millions of apps requesting the rights to access device data and functions beyond those needed to deliver their own functionality.
    4. The security feature in Android 11 is a long overdue crackdown on this permission abuse.
    1. Google’s novel response has been to compare each app to its peers, identifying those that seem to be asking for more than they should, and alerting developers when that’s the case. In its update today, Google says “we aim to help developers boost the trust of their users—we surface a message to developers when we think their app is asking for a permission that is likely unnecessary.”
    1. One of the new tools debuted by Facebook allows administrators to remove and block certain trending topics among employees. The presentation discussed the “benefits” of “content control.” And it offered one example of a topic employers might find it useful to blacklist: the word “unionize.”

      Imagine your employer looking over your shoulder constantly.

      Imagine that you're surveilled not only in regard to what you produce, but to what you—if you're an office worker—tap our in chats to colleagues.

      This is what Facebook does and it's not very different to what China has created with their Social Credit System.

      This is Orwellian.

    1. Zoom didn't do this to comply with local law.

      They did this because they don't want to lose customers in China.

      This is just capitalistic greed.

      Shutting down activists over a dictatorship is wrong, and it is actually as simple as that.

  3. May 2020
    1. The high number of extremist groups was concerning, the presentation says. Worse was Facebook’s realization that its algorithms were responsible for their growth. The 2016 presentation states that “64% of all extremist group joins are due to our recommendation tools” and that most of the activity came from the platform’s “Groups You Should Join” and “Discover” algorithms: “Our recommendation systems grow the problem.”
    1. Website administrators then get access to their visitors’ risk scores and can decide how to handle them: For instance, if a user with a high risk score attempts to log in, the website can set rules to ask them to enter additional verification information through two-factor authentication. As Khormaee put it, the “worst case is we have a little inconvenience for legitimate users, but if there is an adversary, we prevent your account from being stolen.”
    1. If any Firefox engineers are reading this, please don't try to subvert the above workaround, it requires multiple steps and administrator rights to set up, and we must all agree that it is of little sense for Firefox to try defending against unwanted programs or malware that has root access on the device.
  4. Apr 2020
    1. Browser fingerprinting is quite a powerful method of tracking users around the Internet. There are some defensive measures that can be taken with existing browsers, but none of them are ideal. In practice, the most realistic protection is using the Tor Browser, which has put a lot of effort into reducing browser fingerprintability. For day-to-day use, the best options are to run tools like Privacy Badger or Disconnect that will block some (but unfortunately not all) of the domains that try to perform fingerprinting, and/or to use a tool like NoScript for Firefox, which greatly reduces the amount of data available to fingerprinters.
    1. Basically, the attackers don't actually have video of you or access to your contacts, and they haven't been able to install malicious code on your computer. In reality, they're taking a password from a database that's available online, sending it to you, and hoping you're scared enough to believe their story and send them bitcoin.
    1. Abuse There's not much point; if you want to build up a treasure trove of pwned email addresses or usernames, go and download the dumps (they're usually just a Google search away) and save yourself the hassle and time of trying to enumerate an API one account at a time.

      And yet there was a lot of abuse of this API: https://www.troyhunt.com/authentication-and-the-have-i-been-pwned-api/ Why?

    1. Anti-automation on the form where a key can be requested is one thing, stopping someone from manually registering, say, 20 of them with different email addresses and massively amplifying their request rate is quite another.
    2. I got way too many emails from people about API requests being blocked to respond to. Often this was due to simply not meeting the API requirements, for example providing a descriptive UA string. Other times it was because they were on the same network as abusive users. There were also those who simply smashed through the rate limit too quickly and got themselves banned for a day. Other times, there were genuine API users in that West African country who found themselves unable to use the service. I was constantly balancing the desire to make the API easily accessible whilst simultaneously trying to ensure it wasn't taken advantage of.
    3. Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
    4. And, of course, the user agent requirement was easily circumvented as I expected it would be and I simply started seeing randomised strings in the UA.
    5. Combating Abuse with Firewall Rules
    6. Identifying Abusive API Usage
    7. Make more than 40 requests in a minute and you're in the naughty corner for a day. Only thing is, that's IP-based and per the earlier section on abusive patterns, actors with large numbers of IP addresses can largely circumvent this approach. It's still a fantastic turn-key solution that seriously raises the bar for anyone wanting to get around it, but someone determined enough will find a way.
    1. Well, as a home user, I also belong to an investment club with 10 members. I also have a medium size family who I like to send photo's to, and my son is on a soccer team. all those have greater than 5 people on the list. sooooooooo..... once again, the people with valid use of the internet have to 'deal' with those that abuse it.
    1. School for many people is a place to get fed, a place to feel safe, a place to get encouraged. It’s a place to be around people who share your desire to learn. Now they are cut off from that, and some of that can’t be duplicated easily online.

      Yes, this is a problem. However... Schools weren't designed to be a safegaurd against poor parenting, but they're treated that way, as if they're a place to escape the idiots they live with.

      Schools shouldn't tolerate this. Instead, they should intervene. They should bring in a third party, someone/an organization specifically designed to help kids who come from broken homes, to help heal how they live when school's not in session. Any measure less than this signals, to me, a school system that's not paying attention to their student's emotional needs, which are, I believe, key to ensuring the child thrives throughout their school years.

    1. Thousands of enterprises around the world have done exhaustive security reviews of our user, network, and data center layers and confidently selected Zoom for complete deployment. 

      This doesn't really account for the fact that Zoom have committed some atrociously heinous acts, such as (and not limited to):

    2. Transparency has always been a core part of our culture.

      If this were true, why does this exist?

  5. Mar 2020
    1. This is known as transport encryption, which is different from end-to-end encryption because the Zoom service itself can access the unencrypted video and audio content of Zoom meetings. So when you have a Zoom meeting, the video and audio content will stay private from anyone spying on your Wi-Fi, but it won’t stay private from the company.
    2. But despite this misleading marketing, the service actually does not support end-to-end encryption for video and audio content, at least as the term is commonly understood. Instead it offers what is usually called transport encryption, explained further below
    1. The author and production team are to be commended for releasing the article, without a hint of irony, on the Verizon/TechCrunch platform, which perfectly exemplifies the extreme abuses of privacy consent implementation described in the story.
    1. The system has been criticised due to its method of scraping the internet to gather images and storing them in a database. Privacy activists say the people in those images never gave consent. “Common law has never recognised a right to privacy for your face,” Clearview AI lawyer Tor Ekeland said in a recent interview with CoinDesk. “It’s kind of a bizarre argument to make because [your face is the] most public thing out there.”
    1. Enligt Polismyndighetens riktlinjer ska en konsekvensbedömning göras innan nya polisiära verktyg införs, om de innebär en känslig personuppgiftbehandling. Någon sådan har inte gjorts för det aktuella verktyget.

      Swedish police have used Clearview AI without any 'consequence judgement' having been performed.

      In other words, Swedish police have used a facial-recognition system without being allowed to do so.

      This is a clear breach of human rights.

      Swedish police has lied about this, as reported by Dagens Nyheter.

  6. Feb 2020
  7. Jan 2020
    1. received a message telling me that my account had been locked because I was incarcerated and as such, disallowed from using Facebook
    1. Pay for each job is still set through a black-box algorithm
    2. Under the pay model the company employed from 2017 until the fall of 2019, each dollar of customer tip did not raise workers’ earnings by a dollar
  8. Nov 2019
    1. Loading this iframe allows Facebook to know that this specific user is currently on your website. Facebook therefore knows about user browsing behaviour without user’s explicit consent. If more and more websites adopt Facebook SDK then Facebook would potentially have user’s full browsing history! And as with “With great power comes great responsibility”, it’s part of our job as developers to protect users privacy even when they don’t ask for.
    1. Tea cites Chavisa Woods’s recent memoir of sexism 100 Times, Andrea Lawlor’s Paul Takes the Form of a Mortal Girl and Brontez Purnell’s Since I Laid My Burden Down as examples of books that have fearlessly and artfully tackled themes of power and gender relations, misogyny and sexual violence. “Right now, I think the [publishing] industry is responding to what is happening and saying: ‘Yes we really need these voices, we need these ideas out in the world.’

      So true!

      My review of Chavisa Woods's book is here.

    1. Google has confirmed that it partnered with health heavyweight Ascension, a Catholic health care system based in St. Louis that operates across 21 states and the District of Columbia.

      What happened to 'thou shalt not steal'?

    1. Found a @facebook #security & #privacy issue. When the app is open it actively uses the camera. I found a bug in the app that lets you see the camera open behind your feed.

      So, Facebook uses your camera even while not active.

    1. Speaking with MIT Technology Review, Rohit Prasad, Alexa’s head scientist, has now revealed further details about where Alexa is headed next. The crux of the plan is for the voice assistant to move from passive to proactive interactions. Rather than wait for and respond to requests, Alexa will anticipate what the user might want. The idea is to turn Alexa into an omnipresent companion that actively shapes and orchestrates your life. This will require Alexa to get to know you better than ever before.

      This is some next-level onslaught.

    1. Somewhere in a cavernous, evaporative cooled datacenter, one of millions of blinking Facebook servers took our credentials, used them to authenticate to our private email account, and tried to pull information about all of our contacts. After clicking Continue, we were dumped into the Facebook home page, email successfully “confirmed,” and our privacy thoroughly violated.
    1. If the apparatus of total surveillance that we have described here were deliberate, centralized, and explicit, a Big Brother machine toggling between cameras, it would demand revolt, and we could conceive of a life outside the totalitarian microscope.
    1. The FBI is currently collecting data about our faces, irises, walking patterns, and voices, permitting the government to pervasively identify, track, and monitor us. The agency can match or request a match of our faces against at least 640 million images of adults living in the U.S. And it is reportedly piloting Amazon’s flawed face recognition surveillance technology.

      FBI and Amazon are being sued because of surveillance of people living in the USA.

    1. Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc’s (FB.O) WhatsApp to take over users’ phones, according to people familiar with the messaging company’s investigation.
  9. Oct 2019
    1. The Wikimedia Foundation says it is seriously concerned about the idea that cisgender women and transgender editors could be repelled from Wikipedia by online abuse.

      This is also, to myself, indicative of the main problem with Wikipedia: most editors are white men in a certain age span.

      When abuse is added like this, non-men are more likely to stay away, and watch Wikipedia wither into a reason for staying with professionally edited encyclopedias.

    1. Per Bloomberg, which cited an memo from an anonymous Google staffer, employees discovered that the company was creating the new tool as a Chrome browser extension that would be installed on all employees’ systems and used to monitor their activities.

      From the Bloomberg article:

      Earlier this month, employees said they discovered that a team within the company was creating the new tool for the custom Google Chrome browser installed on all workers’ computers and used to search internal systems. The concerns were outlined in a memo written by a Google employee and reviewed by Bloomberg News and by three Google employees who requested anonymity because they aren’t authorized to talk to the press.

    1. A highly interesting article where a well-known company prefers blood money to allowing employees to talk about politics. This is capitalism at its core: all profit, no empathy.

    2. GitLab, a San Francisco-based provider of hosted git software, recently changed its company handbook to declare it won't ban potential customers on "moral/value grounds," and that employees should not discuss politics at work.
    3. Meanwhile at Microsoft's GitHub, employees at both companies have objected to GitHub's business with ICE, not to mention Microsoft's government contracts. Employees at Amazon have also urged the company not to sell its facial recognition technology to police and the military.
    1. This system will apply to foreign owned companies in China on the same basis as to all Chinese persons, entities or individuals. No information contained on any server located within China will be exempted from this full coverage program. No communication from or to China will be exempted. There will be no secrets. No VPNs. No private or encrypted messages. No anonymous online accounts. No trade secrets. No confidential data. Any and all data will be available and open to the Chinese government. Since the Chinese government is the shareholder in all SOEs and is now exercising de facto control over China’s major private companies as well, all of this information will then be available to those SOEs and Chinese companies. See e.g. China to place government officials inside 100 private companies, including Alibaba. All this information will be available to the Chinese military and military research institutes. The Chinese are being very clear that this is their plan.

      At least the current Chinese government are clear about how all-intrusive they will be, so that people can avoid them. IF people can avoid them.

    1. "I know that this is happening all the time. There have been strange faxes containing all sorts of terms of abuse," court spokeswoman Nina Eldh told the newspaper.
    1. Amazon doesn’t tell customers much about its troubleshooting process for Cloud Cam. In its terms and conditions, the company reserves the right to process images, audio and video captured by devices to improve its products and services.
    2. Nowhere in the Cloud Cam user terms and conditions does Amazon explicitly tell customers that human beings are training the algorithms behind their motion detection software.
    3. An Amazon team also transcribes and annotates commands recorded in customers’ homes by the company’s Alexa digital assistant
    4. Dozens of Amazon workers based in India and Romania review select clips captured by Cloud Cam, according to five people who have worked on the program or have direct knowledge of it.
    1. We recently discovered that when you provided an email address or phone number for safety or security purposes (for example, two-factor authentication) this data may have inadvertently been used for advertising purposes, specifically in our Tailored Audiences and Partner Audiences advertising system. 

      Twitter may have sold your e-mail address to people.

      Twitter has only done this with people who have added their e-mail address for security purposes.

      Security purposes for Twitter = sell your e-mail address to a third-party company.

      Spam for you = security purposes for Twitter.

  10. Sep 2019
    1. There is already a lot of information Facebook can assume from that simple notification: that you are probably a woman, probably menstruating, possibly trying to have (or trying to avoid having) a baby. Moreover, even though you are asked to agree to their privacy policy, Maya starts sharing data with Facebook before you get to agree to anything. This raises some serious transparency concerns.

      Privacy International are highlighting how period-tracking apps are violating users' privacy.

  11. Aug 2019
    1. Debate about online annotation technologies and practices will continue.

      I've added a few examples of abuse and conversation here in the past: https://indieweb.org/annotation#Annotation_Sites_Enable_Abuse

    1. Last March, ProPublica published an extensive investigation that found IBM had fired an estimated 20,000 U.S. employees ages 40 or older in the past five years.
    2. The company started firing older workers and replacing them with millennials, who IBM’s consulting department said “are generally much more innovative and receptive to technology than baby boomers.”
    3. International Business Machines Corp. has fired as many as 100,000 employees in the last few years in an effort to boost its appeal to millennials and make it appear to be as “cool” and “trendy” as Amazon and Google, according to a deposition from a former vice president in an ongoing age discrimination lawsuit.

      IBM has a long history of working against humanity, e.g. when colluding with the Nazis.

  12. Jul 2019
    1. Amazon.com Announces Second Quarter Sales up 20% to $63.4 Billion

      Do note that this page mentions nothing on worker rights nor worker wages.

      See this page on the matter.

    2. Amazon announced that it will hire nearly 12,000 new employees across Europe in 2019, taking its permanent workforce in Europe to nearly 95,000 by the end of 2019. Amazon pledged to upskill 100,000 of its employees across the U.S. by 2025, dedicating over $700 million to provide employees across its corporate offices, tech hubs, fulfillment centers, retail stores, and transportation network with access to training programs that will help them move into more highly-skilled roles within or outside of the company. Programs include Machine Learning University, Amazon Technical Academy, and Career Choice.

      More workers that can practically be enslaved in 55-hour-work weeks and sleep standing up: yeay!

    1. Döpfner: Last week we had Bill Gates for dinner here and he said in a self-ironic manner that he has a ridiculous amount of money and it is so hard to find appropriate ways to spend that money reasonably and to do good with the money. So what does money mean for you, being the first person in history who has a net worth of a three-digit amount of billions. Bezos: The only way that I can see to deploy this much financial resource is by converting my Amazon winnings into space travel. That is basically it.

      Why fix the issues with how many Amazon workers are basically wage slaves, working 55-hour weeks, while falling asleep during work?

      For more information:

    1. According to Shoshana Zuboff, professor emerita at Harvard Business School, the Cambridge Analytica scandal was a landmark moment, because it revealed a micro version “of the larger phenomenon that is surveillance capitalism”. Zuboff is responsible for formulating the concept of surveillance capitalism, and published a magisterial, indispensible book with that title soon after the scandal broke. In the book, Zuboff creates a framework and a language for understanding this new world. She believes The Great Hack is an important landmark in terms of public understanding, and that Noujaim and Amer capture “what living under the conditions of surveillance capitalism means. That every action is being repurposed as raw material for behavioural data. And that these data are being lifted from our lives in ways that are systematically engineered to be invisible. And therefore we can never resist.”

      Shoshana Zuboff's comments on The Great Hack.

    1. “those who were responsible for ensuring the accuracy ‘did not give a shit.’” Another individual, “a former Operations Contractor with Facebook, stated that Facebook was not concerned with stopping duplicate or fake accounts.”
  13. Jun 2019
    1. Internalization of anger can cause heart problems. As the Levenson study above shows, holding in your anger takes a toll on your heart. If you grow up in a household that is intolerant of your anger, ignores your anger, or fails to name, discuss or validate the reasons for your anger, you learn only one way to deal with it: wall it off. This may allow you to cope as a child, but it can harm your heart. Sensitivity to stress can cause back problems or headaches. What makes you sensitive to stress? Not dealing with your feelings. When you wall off your fear, your insecurity, your uncertainty, your anger, sadness, or hurt, those feelings do not go away. They simply pool together on the other side of the wall, waiting for something to touch them off. Then, when it happens, they all surge at you, making you feel overwhelmed and stressed. So going through your life with your feelings blocked makes you more sensitive to stress. Lack of self-awareness makes you vulnerable to poor habits. Families who don’t notice what their child is feeling miss getting to know their child on a deeply personal level. So they sadly remain unaware of who their child really is. I have seen, over decades of treating Childhood Emotional Neglect, that if your parents don’t see you, you do not learn that you are worth looking at. You grow up to be unaware of your own needs, and deep down you don’t realize that your needs even matter. You then are vulnerable to eating or sleeping too much or too little, drinking too much, or engaging in other behaviors that can harm your health. 3 Steps to Stop Childhood Emotional Neglect (CEN) From Harming Your Health Start paying attention to your feelings as you go through your day. Learn more emotion words and make an effort to use them, including naming your own feelings see the book Running On Empty: Overcome Your Childhood Emotional Neglect for an exhaustive list of feeling words). As you do steps 1 and 2 you will start to feel more. Now it is time to begin to actively take charge of your feelings. Work on learning the emotion s

      IT should also be stressed that family dysfunction is highly variable and study correlations should never be construed as simple cause and effect. None of it is that simple--especially when it comes to dysfunctional family dynamics.Serious abusers for instance are expert liars (lest outsiders shine light on their true nature), and many come to clinic with stress related complaints about their own childhood experiences. Therapists and other healers must keep that in mind, and not fall to the flattery of 'so-and-so' is so good and helped me so much," while concealing and denying ongoing abuse they may be passing on--some in frank denial--on to their own families and to their own children.

    1. The decision did not favour his financial interests and has been misreported by the journalist. In fact, Mr Petch was pressuring an inexperienced General Manager to attend to an entitlement affecting multiple councillors. The entitlement - reimbursement of legal expenses incurred in legal action initiated by council - is not discretionary, but must be extended to councillors incurring costs in carrying out their civic duties in good faith. The entitlement is explicitly coded in the NSW Local Government Act and NSW Office of Local Government expenses guidelines for serving councillors and Mayor's. No evidence was submitted that the affected councillors had acted in a manner other than "good faith". Therefore the only logical conclusion that could be drawn for delaying the reimbursement

  14. May 2019
    1. Unsurprisingly living up to its reputation, Facebook refuses to comply with my GDPR Subject Access Requests in an appropriate manner.

      Facebook never has cared about privacy of individuals. This is highly interesting.

    1. Do not kid yourself – your business is never, never safe with PayPal. Move away or at least have a plan B in place so that you don’t lose your business over their arbitrary actions.

      Arbitrary seems to be a correct term to use in this instance.

  15. Apr 2019
    1. The report also noted a 27 percent increase in the number of foreigners whose communications were targeted by the NSA during the year. In total, an estimated 164,770 foreign individuals or groups were targeted with search terms used by the NSA to monitor their communications, up from 129,080 on the year prior.
    1. drivers delivering Amazon packages have reported feeling so pressured that they speed through neighborhoods, blow by stop signs, and pee in bottles in the trucks or outside
    2. Amazon's system tracks a metric called "time off task," meaning how much time workers pause or take breaks, The Verge reported. It has been previously reported that some workers feel so pressured that they don't take bathroom breaks.
    3. Amazon employs a system that not only tracks warehouse workers' productivity but also can automatically fire them for failing to meet expectations.

      The bots now fire humans. AI 2.0.

    1. So far, according to the Times and other outlets, this technique is being used by the FBI and police departments in Arizona, North Carolina, California, Florida, Minnesota, Maine, and Washington, although there may be other agencies using it across the country.
    2. In a new article, the New York Times details a little-known technique increasingly used by law enforcement to figure out everyone who might have been within certain geographic areas during specific time periods in the past. The technique relies on detailed location data collected by Google from most Android devices as well as iPhones and iPads that have Google Maps and other apps installed. This data resides in a Google-maintained database called “Sensorvault,” and because Google stores this data indefinitely, Sensorvault “includes detailed location records involving at least hundreds of millions of devices worldwide and dating back nearly a decade.”

      Google is passing on location data to law enforcement without letting users know.

    1. Per a Wednesday report in Business Insider, Facebook has now said that it automatically extracted contact lists from around 1.5 million email accounts it was given access to via this method without ever actually asking for their permission. Again, this is exactly the type of thing one would expect to see in a phishing attack.

      Facebook are worse than Nixon, when he said "I'm not a crook".

    1. “Those who can stick to a 996 schedule are those who have found their passion beyond monetary gains,” Ma wrote.

      This is what capitalists, especially those who make far more money than others below them in their company, want you to believe.

    2. Richard Liu, chief executive of Alibaba arch-foe JD.com Inc., said in a recent post on his WeChat moments that, while he would never force staff to work a 996 schedule, people who slacked off were not considered his “brothers.”
    1. The music we listen to highly impacts our decision making, especially as adolescents. Adolescents are extremely impressionable, and the music they listen to has a great impact on how they decide to live their day to day lives. Popular musicians are seen as role models by the people who idolize them, and adolescents may try to represents the songs in which they favor through their actions every day.

      Recent studies have found that adolescents who listen to music that supports substance abuse and violence have a greater chance to act upon what they listen to. What young adults and teenagers listen to through music and popular media will affect their decision making process. Specifically with substance abuse, and there is a direct uptake in use of illegal substances by adolescents who listen to music that promotes such activities. This can cause a whole societal problem considering most of todays popular music among adolescents touches upon substance abuse and violence. Adolescents are extremely impressionable and the music they listen can shape how a person tries to act, or represent themselves.

    1. The Wikimedia Foundation says it is seriously concerned about the idea that cisgender women and transgender editors could be repelled from Wikipedia by online abuse.

      This is also, to myself, indicative of the main problem with Wikipedia: most editors are white men in a certain age span.

      When abuse is added like this, non-men are more likely to stay away, and watch Wikipedia wither into a reason for staying with professionally edited encyclopedias.

    1. Washington state Attorney General Bob Ferguson said Thursday that Motel 6 shared the information of about 80,000 guests in the state from 2015 to 2017. That led to targeted investigations of guests with Latino-sounding names, according to Ferguson. He said many guests faced questioning from ICE, detainment or deportation as a result of the disclosures. It's the second settlement over the company's practice in recent months.

      If you stay at Motel 6, prepare to have your latino-tinged data handed over to the authorities who are looking to harm you permanently.

    1. LastPass is run by LogMeIn, Inc. which is based in United States. So let’s say the NSA knocks on their door: “Hey, we need your data on XYZ so we can check their terrorism connections!” As we know by now, NSA does these things and it happens to random people as well, despite not having any ties to terrorism. LastPass data on the server is worthless on its own, but NSA might be able to pressure the company into sending a breach notification to this user.
    1. U.S. securities regulators shot down attempts by Amazon.com Inc to stop its investors from considering two shareholder proposals about the company’s controversial sale of a facial recognition service, a sign of growing scrutiny of the technology.

      Surveillance capitalism at its worst; this behemoth tries to have the people who own it not make decisions.

      Capitalism is like Skynet, an organism that's taken flight on its own, bound to make solipsistic and egoistic judgments and choices.

    1. Facebook users are being interrupted by an interstitial demanding they provide the password for the email account they gave to Facebook when signing up. “To continue using Facebook, you’ll need to confirm your email,” the message demands. “Since you signed up with [email address], you can do that automatically …”A form below the message asked for the users’ “email password.”

      So, Facebook tries to get users to give them their private and non-Facebook e-mail-account password.

      This practice is called spear phishing.

    1. After 4 months of waiting, that is the response I got from Widevine, Google’s DRM for web browsers, regarding a license agreement. For the last 2 years I’ve been working on a web browser that now cannot be completed because Google, the creators of the open source browser Chrome, won’t allow DRM in an open source project.

      Google blocks this open-source web browser as created by Samuel Maddock, because it's open source.

    1. “Prison labor” is usually associated with physical work, but inmates at two prisons in Finland are doing a new type of labor: classifying data to train artificial intelligence algorithms for a startup. Though the startup in question, Vainu, sees the partnership as a kind of prison reform that teaches valuable skills, other experts say it plays into the exploitative economics of prisoners being required to work for very low wages.

      Naturally, this is exploitative; the inmates do not learn a skill that they can take out into the real world.

      I'd be surprised if they'd not have to sign a NDA for this.

  16. Mar 2019
    1. As one of 13 million officially designated “discredited individuals,” or laolai in Chinese, 47-year-old Kong is banned from spending on “luxuries,” whose definition includes air travel and fast trains.
    2. Discredited individuals have been barred from taking a total of 17.5 million flights and 5.5 million high-speed train trips as of the end of 2018, according to the latest annual report by the National Public Credit Information Center.The list of “discredited individuals” was introduced in 2013, months before the State Council unveiled a plan in 2014 to build a social credit system by 2020.

      This is what surveillance capitalism brings. This is due to what is called China's "Golden Shield", a credit-statement system that, for example, brings your credit level down if you search for terms such as "Tianmen Square Protest" or post "challenging" pictures on Facebook.

      This is surveillance capitalism at its worst, creating a new lower class for the likes of Google, Facebook, Microsoft, Amazon, and insurance companies. Keep the rabble away, as it were.

    1. In recent weeks, a wave of armed assaults has spread across Djugu territory in Ituri Province in the east of this nation, emptying whole villages. While the overall death toll is uncertain, there is reason to believe it may reach into the hundreds; witnesses and activists said that 34 villages had been attacked. Since December, an estimated 150,000 people have fled their homes, according to humanitarian workers in the region.
  17. Jan 2019
    1. We must have an agency of the federal government to pMtett it.

      Is a federal government, and a federal government alone, enough to do such a thing? I mean, look at what happened to the Library of Alexandria. I still get pissed off thinking about that. And is it even a good idea in the first place to let them have that responsibility? I can't help but think of all of the instances in which governments have been directly responsible for mass destructions of literature. There's an entire Wikipedia page dedicated to historical book burning events, https://en.wikipedia.org/wiki/List_of_book-burning_incidents, and a large majority of these noteworthy burnings were done at the will of the government. What would happen if we were to give them too much agency in this matter? Is it a good idea for governments to have the final say in the well-being of our literature? How can we trust them to decide what is and isn't worth protecting?

  18. Sep 2018
    1. "The 'freely choosing women'... As if you've raised a freely choosing black person [who decides to 'freely choose'] to clean toilets. That's the equivalent. You call that freedom. It's called freedom when women choose to do it and it's sex because people believe that sex is free. However, pornography is selling yourself for sex. The idea of money is supposed to make it free. Usually, when people have sex with another person and choose to do it, they're not being paid, it's free because you're not being paid. In other words, this is an arm of prostitution." [NOT VERBATIM] [3:53-4:31]

  19. Aug 2018
    1. Mastodon deliberately does not support arbitrary search. If someone wants their message to be discovered, they can use a hashtag, which can be browsed. What does arbitrary search accomplish? People and brands search for their own name to self-insert into conversations they were not invited to. What you can do, however, is search messages you posted, received or favourited. That way you can find that one message on the tip of your tongue.
    2. So that’s already a huge advantage over other platforms due the basic design. And in my opinion it’s got advantages over the other extreme, too, a pure peer-to-peer design, where everyone would have to fend for themselves, without the pooled resources.

      Definitely something the IndieWeb may have to solve for.

    1. In the New Testament, familial metaphors are frequently used to describe Christians and what came to be construed as the universal Church. Christians are “brothers” and “sisters” to one another. Weirdly, collectively they are also the body and the bride of Christ. Wives are commanded to submit to their husbands “as you do to the Lord. For the husband is the head of the wife as Christ is the head of the church, his body, of which he is the Savior” (Ephesians 5:22-23). This teaching of male headship is, of course, a source of much abuse of women in conservative Christian circles, and evangelical pastors have been known to abuse, to sweep abuse under the rug, and to counsel women that they must remain in abusive marriages since, after all, Jesus himself forbade divorce, and God can use suffering for good.

      And of course this also likely the source of American mores which have delivered us the power struggle that results in abuses which have boiled over into the MeToo scandals.

  20. Jul 2018
  21. May 2017