404 Matching Annotations
  1. Last 7 days
    1. To add insult to injury I learn that when Cloudflare automatically detects an anomaly with your domain they permanently delete all DNS records. Mine won't be difficult to restore, but I'm not sure why this is necessary. Surely it would be possible for Cloudflare to mark a domain as disabled without irrevocably deleting it? Combined with the hacky audit log, I'm left with the opinion that for some reason Cloudflare decided to completely half-ass the part of their system that is responsible for deleting everything that matters to a user.

      ...and this is why some companies should not grow to become too big for the good of their customers.

    1. There are deeper strata of truth in cinema, and there is such a thing as poetic, ecstatic truth. It is mysterious and elusive, and can be reached only through fabrication and imagination and stylization.
    1. When our analysts discovered six vulnerabilities in PayPal – ranging from dangerous exploits that can allow anyone to bypass their two-factor authentication (2FA), to being able to send malicious code through their SmartChat system – we were met with non-stop delays, unresponsive staff, and lack of appreciation. Below, we go over each vulnerability in detail and why we believe they’re so dangerous. When we pushed the HackerOne staff for clarification on these issues, they removed points from our Reputation scores, relegating our profiles to a suspicious, spammy level. This happened even when the issue was eventually patched, although we received no bounty, credit, or even a thanks. Instead, we got our Reputation scores (which start out at 100) negatively impacted, leaving us worse off than if we’d reported nothing at all.

      Paypal is a bad company in many ways. This is one of them.

    1. GARCIA-NAVARRO: Yeah, the CBC sent a professional dumpster diver out to some major Toronto shopping malls while they were looking into this. And she found all kinds of boxes of new items just thrown in the trash. VASIL: It's really alarming, actually, when you realize how much is ending up in the trash that is perfectly good and still in functional condition.
    1. Last year, Facebook said it would stop listening to voice notes in messenger to improve its speech recognition technology. Now, the company is starting a new program where it will explicitly ask you to submit your recordings, and earn money in return.

      Given Facebook's history with things like breaking laws that end up with them paying billions of USD in damages (even though it's a joke), sold ads to people who explicitly want to target people who hate jews, and have spent millions of USD every year solely on lobbyism, don't sell your personal experiences and behaviours to them.

      Facebook is nefarious and psychopathic.

    1. The most popular modern secure messaging tool is Signal, which won the Levchin Prize at Real World Cryptography for its cryptographic privacy design. Signal currently requires phone numbers for all its users. It does this not because Signal wants to collect contact information for its users, but rather because Signal is allergic to it: using phone numbers means Signal can piggyback on the contact lists users already have, rather than storing those lists on its servers. A core design goal of the most important secure messenger is to avoid keeping a record of who’s talking to whom. Not every modern secure messenger is as conscientious as Signal. But they’re all better than Internet email, which doesn’t just collect metadata, but actively broadcasts it. Email on the Internet is a collaboration between many different providers; and each hop on its store-and-forward is another point at which metadata is logged. .
    1. grammar : a punctuation mark — that is used especially to indicate a break in the thought or structure of a sentence
    1. Shortly after Citrix initially disclosed the intrusion in March 2019, a little-known security company Resecurity claimed it had evidence Iranian hackers were responsible, had been in Citrix’s network for years, and had offloaded terabytes of data. Resecurity also presented evidence that it notified Citrix of the breach as early as Dec. 28, 2018, a claim Citrix initially denied but later acknowledged.
  2. Feb 2020
    1. Spotify is directly mimicking Google and Facebook, and attempting to roll up power over digital audio markets the way Google and Facebook did over the internet. It has already done so in music. Here’s Rolling Stone, reporting on Spotify’s exploitation of its public utility platform of music distribution to organizes payola-style extortion against artists.
    1. Revenue of $4.1 billion, growing 37% year-over-year or 39% on a constant currency basis

      They forgot to add '...money that our drivers—who basically are left to their own devices where blame and poor wages are concerned—will never see.'

    1. I suspect that Wacom doesn’t really think that it’s acceptable to record the name of every application I open on my personal laptop. I suspect that this is why their privacy policy doesn’t really admit that this is what that they do.
    1. 99 second hand smartphones are transported in a handcart to generate virtual traffic jam in Google Maps.Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route to avoid being stuck in traffic.
  3. Jan 2020
    1. received a message telling me that my account had been locked because I was incarcerated and as such, disallowed from using Facebook
    1. Pay for each job is still set through a black-box algorithm
    2. Under the pay model the company employed from 2017 until the fall of 2019, each dollar of customer tip did not raise workers’ earnings by a dollar
    1. The plural for the small rodent is always "mice" in modern usage. The plural of a computer mouse is either "mouses" or "mice" according to most dictionaries, with "mice" being more common.[4] The first recorded plural usage is "mice"; the online Oxford Dictionaries cites a 1984 use, and earlier uses include J. C. R. Licklider's "The Computer as a Communication Device" of 1968.[5] The term computer mouses may be used informally in some cases. Although the plural of a mouse (small rodent) is mice, the two words have undergone a differentiation through usage.
    2. plural mice
    1. Man hade utmålat partiet som ett rasistiskt parti, historien om hur vi bildades stod ju där, säger Per Göransson, distriktsordförande för SD i Norrbotten, till SVT.

      Om sverigedemokraterna verkligen är upprörda över sitt förflutna bör de även rikta kritiken mot sin nuvarande ledning.

    1. Now, Google has to change its practices and prompt users to choose their own default search engine when setting up a European Android device that has the Google Search app built in. Not all countries will have the same options, however, as the choices included in Google’s new prompt all went to the highest bidders.As it turns out, DuckDuckGo must have bid more aggressively than other Google competitors, as it’s being offered as a choice across all countries in the EU.
    1. A Microsoft programme to transcribe and vet audio from Skype and Cortana, its voice assistant, ran for years with “no security measures”, according to a former contractor who says he reviewed thousands of potentially sensitive recordings on his personal laptop from his home in Beijing over the two years he worked for the company.

      Wonderful. This, combined with the fact that Skype users can—fairly easily—find out which contacts another person has, is horrifying.

      Then again, most people know that Microsoft have colluded with American authorities to divulge chat/phone history for a long time, right?

  4. Dec 2019
    1. Google found 1,494 device identifiers in SensorVault, sending them to the ATF to comb through. In terms of numbers, that’s unprecedented for this form of search. It illustrates how Google can pinpoint a large number of mobile phones in a brief period of time and hand over that information to the government
    1. he issue of Håkan Hellström begins to arise with the addition of Gothenburg Film Studios to the team, as Blomgren DoVan is convinced the inclusion of Hellström in the project would guarantee Swedish funding. However, one of the first issues the filmmakers had become aware of at the inception of the project was the fact that Hellström is a huge pop star in Sweden who had built his 20 year career off of egregious plagiarism and copyright infringement of English-language artists. For reasons the filmmakers could not understand, this issue had never been litigated and no one in Sweden appeared to care about it; in fact, the filmmakers learned early on that the subject was a point of contention for many Swedes.  ​ Not wanting to offend the Swedes, the filmmakers concede, and in April, shoot a bizarre two-day Hellström concert in New York. Hellström, who sings in Swedish and is unknown outside of Scandinavia, plays two sold-out shows at Gramercy Theater in Manhattan to an audience comprised entirely of Swedes who had flown to NYC for the event, many of whom attended both nights. The show is publicized in Sweden as though Hellström had sold-out the show to the local New York audience, however, this is not the case. During the weekend, Hellström avoids so much as acknowledging Trask and Hecht, who are among only a small handful of people present at the venue from pre-soundcheck to load-out. To make matters worse, on the second night of filming, Hecht is briefly cornered in the basement of the venue by Hellström's "A&R" Isse Samie, who is extremely drunk and inappropriate towards Hecht, over 20 years his junior. Blomgren DoVan appears unmoved by the events of the weekend, and Trask and Hecht drop the issue.

      I wonder what Håkan Hellström fans think of this.

    1. Despite the successful resolution, it was still quite unsettling that a domain name could be transferred to another registrant and sinkholed for some perceived violation. I thought there would be more checks in place to confirm that a perceived violation was real before a domain could be transferred.

      This is highly unsettling. A person, organisation, country, or company should not be able to have a domain name transferred from its rightful owner this easily.

  5. Nov 2019
    1. En stöld som avtäcks är aldrig ett misslyckande. Den är en varsamt inslagen gåva från författaren till läsaren.

      Han kan ju tänka på Bowie.

      Bowie läste, lyssnade, såg och upplevde kopiöst; han inspirerades, informerade, och skapade ny konst genom den gamla.

      Men: han stal aldrig.

      Att stjäla är annat än att ta. Att stjäla är illegalt.

      Det finns skäl till att stöld är illegalt.

      Jag tror inte att Kristofer Andersson har förstått lagens existensberättigande.

    1. I en mejlväxling mellan Lars Ohlson och Mordpodden som Kulturnyheterna tagit del av framgår det att Amanda Karlsson och Linnéa Bohlin tar illa vid sig av kritiken. ”Att du anser att vi plagierat ditt arbete får oss att må sämre än du kan ana.”, skriver de. De tar också bort avsnittet med omedelbar verkan.Efter en lång mejl-växling skickar Linnéa Bohlin och Amanda Karlsson ett avtal där de erbjuder Lars Ohlson 30 000 kronor. Men avtalet innehåller också punkter där Lars Ohlson förbinder sig att inte yppa något om avtalet för all framtid, och att om han skriver under avtalet också blir rättsligt ansvarig för innehållet i avsnittet.– De skrev att de hade gråtit över mina anklagelser. Sen kopplade de in advokater. Och då tröttnade jag och polisanmälde istället, säger Lars Ohlson.
    1. As Laurence, one of those fired today, said during a workers’ rally in San Francisco on Friday November 22nd, “I asked Google’s Global Investigations team, am I being accused of leaking? Their answer was one word: ‘No.’ This isn’t about leaking.”
    2. Google hired a union-busting firm. Around the same time Google redrafted its policies, making it a fireable offense to even look at certain documents. And let’s be clear, looking at such documents is a big part of Google culture; the company describes it as a benefit in recruiting, and even encourages new hires to read docs from projects all across the company.
    1. Thank you to everyone who does the right thing every day

      This is Google saying 'We're not going to say what "the wrong thing" is, but if you do it, you will be fired. If you're currently not fired, you're doing the right thing.'

    1. Uber will not be granted a new licence to operate in London after repeated safety failures, Transport for London (TfL) has said.

      The regulator said the taxi app was not "fit and proper" as a licence holder, despite having made a number of positive changes to its operations.

    1. Loading this iframe allows Facebook to know that this specific user is currently on your website. Facebook therefore knows about user browsing behaviour without user’s explicit consent. If more and more websites adopt Facebook SDK then Facebook would potentially have user’s full browsing history! And as with “With great power comes great responsibility”, it’s part of our job as developers to protect users privacy even when they don’t ask for.
    1. Tea cites Chavisa Woods’s recent memoir of sexism 100 Times, Andrea Lawlor’s Paul Takes the Form of a Mortal Girl and Brontez Purnell’s Since I Laid My Burden Down as examples of books that have fearlessly and artfully tackled themes of power and gender relations, misogyny and sexual violence. “Right now, I think the [publishing] industry is responding to what is happening and saying: ‘Yes we really need these voices, we need these ideas out in the world.’

      So true!

      My review of Chavisa Woods's book is here.

    1. I’m on cloud nine. Look at this glorious keyboard! An Esc key! Inverted-T arrow keys! A millimeter of key travel! Enough spacing between the keys for our fingers to accurately orient themselves! And keystrokes will probably work, 100% of the time, for years!

      What I would give to have this!

    1. half of iPhone users don’t know there’s a unique ID on their phone (called an IDFA, for “identifier for advertisers”) tracking their app activity and sending it to third-party advertisers by default.
    1. From this page:

      AUPresses thinks more readers should be aware of the work they’re doing. That’s why during the organization’s annual University Press Week, it launched a reading list it’s calling READ. THINK. ACT., a list of 75 peer-reviewed books designed to help non-academic readers understand the world and work to make it a better place.

    1. Google has confirmed that it partnered with health heavyweight Ascension, a Catholic health care system based in St. Louis that operates across 21 states and the District of Columbia.

      What happened to 'thou shalt not steal'?

    1. Found a @facebook #security & #privacy issue. When the app is open it actively uses the camera. I found a bug in the app that lets you see the camera open behind your feed.

      So, Facebook uses your camera even while not active.

    1. Speaking with MIT Technology Review, Rohit Prasad, Alexa’s head scientist, has now revealed further details about where Alexa is headed next. The crux of the plan is for the voice assistant to move from passive to proactive interactions. Rather than wait for and respond to requests, Alexa will anticipate what the user might want. The idea is to turn Alexa into an omnipresent companion that actively shapes and orchestrates your life. This will require Alexa to get to know you better than ever before.

      This is some next-level onslaught.

    1. An explosive trove of nearly 4,000 pages of confidential internal Facebook documentation has been made public, shedding unprecedented light on the inner workings of the Silicon Valley social networking giant.

      I can't even start telling you how much schadenfreude I feel at this. Even though this paints a vulgar picture, Facebook are still doing it, worse and worse.

      Talk about hiding in plain sight.

    1. Somewhere in a cavernous, evaporative cooled datacenter, one of millions of blinking Facebook servers took our credentials, used them to authenticate to our private email account, and tried to pull information about all of our contacts. After clicking Continue, we were dumped into the Facebook home page, email successfully “confirmed,” and our privacy thoroughly violated.
    1. In 2013, Facebook began offering a “secure” VPN app, Onavo Protect, as a way for users to supposedly protect their web activity from prying eyes. But Facebook simultaneously used Onavo to collect data from its users about their usage of competitors like Twitter. Last year, Apple banned Onavo from its App Store for violating its Terms of Service. Facebook then released a very similar program, now dubbed variously “Project Atlas” and “Facebook Research.” It used Apple’s enterprise app system, intended only for distributing internal corporate apps to employees, to continue offering the app to iOS users. When the news broke this week, Apple shut down the app and threw Facebook into some chaos when it (briefly) booted the company from its Enterprise Developer program altogether.
    1. If the apparatus of total surveillance that we have described here were deliberate, centralized, and explicit, a Big Brother machine toggling between cameras, it would demand revolt, and we could conceive of a life outside the totalitarian microscope.
    1. The FBI is currently collecting data about our faces, irises, walking patterns, and voices, permitting the government to pervasively identify, track, and monitor us. The agency can match or request a match of our faces against at least 640 million images of adults living in the U.S. And it is reportedly piloting Amazon’s flawed face recognition surveillance technology.

      FBI and Amazon are being sued because of surveillance of people living in the USA.

    1. Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc’s (FB.O) WhatsApp to take over users’ phones, according to people familiar with the messaging company’s investigation.
  6. Oct 2019
    1. Per Bloomberg, which cited an memo from an anonymous Google staffer, employees discovered that the company was creating the new tool as a Chrome browser extension that would be installed on all employees’ systems and used to monitor their activities.

      From the Bloomberg article:

      Earlier this month, employees said they discovered that a team within the company was creating the new tool for the custom Google Chrome browser installed on all workers’ computers and used to search internal systems. The concerns were outlined in a memo written by a Google employee and reviewed by Bloomberg News and by three Google employees who requested anonymity because they aren’t authorized to talk to the press.

    1. A highly interesting article where a well-known company prefers blood money to allowing employees to talk about politics. This is capitalism at its core: all profit, no empathy.

    2. GitLab, a San Francisco-based provider of hosted git software, recently changed its company handbook to declare it won't ban potential customers on "moral/value grounds," and that employees should not discuss politics at work.
    3. Meanwhile at Microsoft's GitHub, employees at both companies have objected to GitHub's business with ICE, not to mention Microsoft's government contracts. Employees at Amazon have also urged the company not to sell its facial recognition technology to police and the military.
    4. If you can see how people might respond to IBM, infamous for providing technology that helped the Nazis in World War II, saying, "Who has time to look into the source of this hard German currency?" you can imagine how GitLab's policy amendment has been received.
    1. In 1973, four years before it was published, Philip K. Dick sent his agent, Scott Meredith, an outline of his novel A Scanner Darkly. This cover letter includes an enthusiastic PS.
    1. there's still the issue of user IP addresses, which Tencent would see for those using devices with mainland China settings. That's a privacy concern, but its one among many given that other Chinese internet companies – ISPs, app providers, cloud service providers, and the like – can be assumed to collect that information and provide it to the Chinese surveillance state on demand.
    1. This system will apply to foreign owned companies in China on the same basis as to all Chinese persons, entities or individuals. No information contained on any server located within China will be exempted from this full coverage program. No communication from or to China will be exempted. There will be no secrets. No VPNs. No private or encrypted messages. No anonymous online accounts. No trade secrets. No confidential data. Any and all data will be available and open to the Chinese government. Since the Chinese government is the shareholder in all SOEs and is now exercising de facto control over China’s major private companies as well, all of this information will then be available to those SOEs and Chinese companies. See e.g. China to place government officials inside 100 private companies, including Alibaba. All this information will be available to the Chinese military and military research institutes. The Chinese are being very clear that this is their plan.

      At least the current Chinese government are clear about how all-intrusive they will be, so that people can avoid them. IF people can avoid them.

    1. The Swedish Royal Court has confirmed that it has been receiving abusive faxes from the fanatical Westboro Baptist Church sect.

      More info is found here.

    2. Carl XVI Gustaf

      He's found here in Wikipedia.

      He's an adulterer and a scumbag, but perhaps not popinjay; he doesn't dress well enough to deserve the adjective.

    1. "I know that this is happening all the time. There have been strange faxes containing all sorts of terms of abuse," court spokeswoman Nina Eldh told the newspaper.
    1. Amazon doesn’t tell customers much about its troubleshooting process for Cloud Cam. In its terms and conditions, the company reserves the right to process images, audio and video captured by devices to improve its products and services.
    2. Nowhere in the Cloud Cam user terms and conditions does Amazon explicitly tell customers that human beings are training the algorithms behind their motion detection software.
    3. An Amazon team also transcribes and annotates commands recorded in customers’ homes by the company’s Alexa digital assistant
    4. Dozens of Amazon workers based in India and Romania review select clips captured by Cloud Cam, according to five people who have worked on the program or have direct knowledge of it.
    1. The band was formed in December 2003, in Haninge. Their name comes from a lyric in the song "People" by the Silver Jews.[1]
    1. We recently discovered that when you provided an email address or phone number for safety or security purposes (for example, two-factor authentication) this data may have inadvertently been used for advertising purposes, specifically in our Tailored Audiences and Partner Audiences advertising system. 

      Twitter may have sold your e-mail address to people.

      Twitter has only done this with people who have added their e-mail address for security purposes.

      Security purposes for Twitter = sell your e-mail address to a third-party company.

      Spam for you = security purposes for Twitter.

    1. But now you only call meWhen you're feeling depressedWhen you feel happy I'mSo far from your mind
    1. In case you wanted to be even more skeptical of Mark Zuckerberg and his cohorts, Facebook has now changed its advertising policies to make it easier for politicians to lie in paid ads. Donald Trump is taking full advantage of this policy change, as popular info reports.
    2. The claim in this ad was ruled false by those Facebook-approved third-party fact-checkers, but it is still up and running. Why? Because Facebook changed its policy on what constitutes misinformation in advertising. Prior to last week, Facebook’s rule against “false and misleading content” didn’t leave room for gray areas: “Ads landing pages, and business practices must not contain deceptive, false, or misleading content, including deceptive claims, offers, or methods.”
    1. This is a small attempt to provide an amount of comfort by bringing together and sharing ways he connected with his audience and to document a dispersed part of who he was.

    1. A recently-unearthed performance from David Berman, reading a poem while accompanied by Bloomington, IN legends the Impossible Shapes, at Second Story, 2005.

    1. CH1009: SCUD MOUNTAIN BOYS: Pine Box LP "This time of year the light comes through the pines in flat beams and spark points, glancing off the frost that decorates the grounds of the light-studded medical cities. For a six-sided second I feel like I'm back in the haunted Piedmonts, a decorated major in the Japanese Inner Space Program, renewing my vow to bear down on the truth even if there is none for the hundredth time. After the exodus of the Calm Reflectors I had started seeing the Scud Mountain Boys around town with their Baltimore haircuts, the guitarist's guitarist carrying his 1873 'trapdoor' Springfield rifle, the progeny of the muzzle-loading French Charleville muskets that had whacked so many Redcoats around these hills. I had heard it was the band's tradition to lay dinner on the table uncooked and then set the table on fire.I was out for a walk with Mr. Fiddler the other night, when he turned to me and said, 'this is the time of year when the region is at peace with itself.' I turned to laugh in his face when the impulse subsided. He had been right of course. I'd already seen it happen in the slide projector's cone of lit dust: the November sky hovering over lives of dark employment like a televised clay bank, breech-loaders replacing muzzle-loaders, crows wired to the sky like marred pixels, portraits cubed into accordioned life while every single object of perception waited for us in the air conditioning. Yes, tennis crested in the seventies, killing Eddie Money and the last of the Holmby Hills Rat Pack, but how many times did we have to witness the L.A. fireplaces reflected in L.A. wineglasses before it ended?You meet these suburban kids with Biblical names, but there are walls behind their eyes, strange mathematical mountains at whose base we sit playing our native keyboards and rinsing our teeth with digital snow. I'm starting to believe that the inscription above the portal describes this side, not the next. Few people know that George Washington's favorite song was 'The Darby Ram,' or stop to think that before he was a statue he scratched his weld, got the hiccups, and danced alone in his room. All the 'human things.' He must have been scared when he fought in the woods, hiding in the dormant Christmas trees, his hand gripping the black walnut musket stock. In those times and these we turn to the pacifics of a Gamelan orchestra for transport and release. We stand by the hind legs of a K car, listening to the new city cassettes, searching for some sign of human residence here beneath the justifiably uncelebrated Massachusetts sky. This treasured early work brought calm forecasts and sad peace to our house. I hope you take it with you when you go. - D.C. Berman, Original Liner Notes to 'Pine Box' LP
  7. Sep 2019
    1. Det är ju så dumt, det är naturligtvis uttalet som han hakar upp sig på. Om man lyssnar på hennes svenska, hennes grammatik, hennes ordförråd, så är det så gott som perfekt, säger Abelin.
    2. Men kungen är min favorit. Av det man har sett och hört så verkar han vara en riktigt go gubbe
    1. This is definitely from an incel's perspective, and I also realize it's also the ultimate neo-liberal love song, as we sit in a place of peak individualism. It's not the kind of message I'm proud to spread. I don't intend it to be a love song to the self — it's more of an 'I'm stuck with myself' song. If no one wants to fuck you, it's your fault.

      I still miss David Berman so very, very much, and I know I will continue to miss him for as long as I live.

    1. On social media, we are at the mercy of the platform. It crops our images the way it wants to. It puts our posts in the same, uniform grids. We are yet another profile contained in a platform with a million others, pushed around by the changing tides of a company's whims. Algorithms determine where our posts show up in people’s feeds and in what order, how someone swipes through our photos, where we can and can’t post a link. The company decides whether we're in violation of privacy laws for sharing content we created ourselves. It can ban or shut us down without notice or explanation. On social media, we are not in control.

      This is why I love personal web sites. They're your own, you do whatever you want with them, and you control them. Nothing is owned by others and you're completely free to do whatever you want.

      That's not the case with Facebook, Microsoft, Slack, Jira, whatever.

    1. Goodreads is nearly useless for finding recommendations

      I believe that the point of Goodreads—since Amazon bought the site—is lost here.

      The point of Goodreads is to make people buy books from Amazon. They're capitalists. They don't care about the common good, or about making people find books that they can truly benefit from.

    1. I feel by far less distracted. My attention span feels more robust than it ever has. I also clocked in at 1000 consecutive days of meditation this past year so I’m not sure which can lay claim to more of these benefits, but my hunch is that getting rid of social media helped.

      No Facebook/Instagram/"social media" better concentration. I'm quite sure that this adheres to a lot of people.

    1. This phrase book is aimed to help newcomers to the U.S understand what some popular local idioms really mean.

      A nice little phrase guide to US English.

    1. disk Use disk only in the context of Azure cloud storage and virtual machines.Use hard drive, not disk, fixed disk, hard disk, or disk drive to refer to the drive on a PC where programs are typically stored.
    1. There is already a lot of information Facebook can assume from that simple notification: that you are probably a woman, probably menstruating, possibly trying to have (or trying to avoid having) a baby. Moreover, even though you are asked to agree to their privacy policy, Maya starts sharing data with Facebook before you get to agree to anything. This raises some serious transparency concerns.

      Privacy International are highlighting how period-tracking apps are violating users' privacy.

  8. Aug 2019