David says,
A lot of people have noticed that every time Photoshop launches, they can't stop staring at one name on the Splash Screen: Seetharaman Narayanan. His unusual name has inspired quite a following on the internet. Now you can learn a little more about the man behind the name.
— Read the rest
If you suspect that COVID's still around (spoiler alert: you're right), but don't have any idea where to find data (since so many places that used to provide data have stopped), here are some resources that I've found helpful.
Probably the best source of data, currently, is Biobot Analytics' COVID-10 wastewater analysis charts. — Read the rest
Now that many online services rely on sending SMSes to your phone to authenticate your identify, thieves and stalkers have created a whole "SIM swap" industry where they defraud your phone company or bribe employees to help them steal your phone account so they can break into all your other accounts.
Princeton computer scientist Arvind Narayanan (previously) has posted slides and notes from a recent MIT talk on "How to recognize AI snake oil" in which he divides AI applications into three (nonexhaustive) categories and rates how difficult they are, and thus whether you should believe vendors who claim that their machine learning models can perform as advertised.
Olive ("Open Library of Images for Virtualized Execution") is an experimental service from Carnegie Mellon University that stores images of old processors, as well as the old operating systems that ran on top of them, along with software packages for those old OSes; this allows users to access old data from obsolete systems inside simulations of the computers that originally ran that data, using the original operating systems and applications.
IoT Inspector is a new tool from Princeton's computer science department; it snoops on the traffic from home IoT devices and performs analysis to determine who they phone home to, whether they use encryption, and what kinds of data they may be leaking.
Marketing companies frequently "anonymize" their dossiers on internet users using hashes of their email addresses — rather than the email addresses themselves — as identifiers in databases that are stored indefinitely, traded, sold, and leaked.
In An Empirical Analysis of Traceability in the Monero Blockchain, a group of eminent computer scientists analyze a longstanding privacy defect in the Monero cryptocurrency, and reveal a new, subtle flaw, both of which can be used to potentially reveal the details of transactions and identify their parties.
A group of CMU researchers have created a generalizable approach to converting the model files generated by 3D design packages into knitting patterns that can be fed into a variety of computerized knitting machines, which then "print" the solid by knitting it.
Oxford's Computational Propaganda Project surveyed 13,500 "politically active" US Twitter users and 48,000 publicly visible Facebook pages, coding them for political affiliation, then measuring how much "junk news" (a news article that fails to live up to three or more of the following: professionalism, style, credibility, bias, counterfeit) was consumed and share by users based on their political affiliation.
Even the most stringent privacy rules have massive loopholes: they all allow for free distribution of "de-identified" or "anonymized" data that is deemed to be harmless because it has been subjected to some process.
The "replay sessions" captured by surveillance-oriented "analytics" companies like Fullstory allow their customers — "Walgreens, Zocdoc, Shopify, CareerBuilder, SeatGeek, Wix.com, Digital Ocean, DonorsChoose.org, and more" — to watch everything you do when you're on their webpages — every move of the mouse, every keystroke (even keystrokes you delete before submitting), and more, all attached to your real name, stored indefinitely, and shared widely with many, many "partners."
Ad-blockers begat ad-blocker-blockers, which begat ad-blocker-blocker-blockers, with no end in sight.
Researchers from MIT, UC Berkeley, Lawrence Berkeley, and King Abdulaziz City for Science and Technology published a paper in Science describing a solar-powered device that uses a new type of metal organic framework (MOF) to extract up to three litres of water per day from even the most arid desert air.
Princeton computer science researchers Steven Englehardt and Arvind Narayanan (previously) have just published a new paper, Online tracking: A 1-million-site measurement and analysis, which documents the state of online tracking beyond mere cookies — sneaky and often illegal techniques used to "fingerprint" your browsers and devices as you move from site to site, tracking you even when you explicitly demand not to be track and take countermeasures to prevent this.
In Online tracking: A 1-million-site measurement and analysis, eminent Princeton security researchers Steven Englehardt and Arvind Narayanan document the use of device battery levels — accessible both through mobile platform APIs and HTML5 calls — to track and identify users who are blocking cookies and other methods of tracking.
The Princeton Bitcoin Book by Arvind Narayanan, Joseph Bonneau, Edward Felten,
Andrew Miller and Steven Goldfeder is a free download — it's over 300 pages and is intended for people "looking to truly understand how Bitcoin works at a technical level and have a basic familiarity with computer science and programming."
Cory Doctorow summarizes the problem with the idea that sensitive personal information can be removed responsibly from big data: computer scientists are pretty sure that's impossible.
Social networking sites are Skinner boxes designed to train you to undervalue your privacy. Since all the compromising facts of your life add less than a dollar to the market-cap of the average social network, they all push to add more "sharing" by default, with the result that unless you devote your life to it, you're going to find your personal info shared ever-more-widely by G+, Facebook, Linkedin, and other "social" services. — Read the rest
One of the most interesting technical presentations I attended in 2012 was the talk on "adversarial stylometry" given by a Drexel College research team at the 28C3 conference in Berlin. "Stylometry" is the practice of trying to ascribe authorship to an anonymous text by analyzing its writing style; "adversarial stylometry" is the practice of resisting stylometric de-anonymization by using software to remove distinctive characteristics and voice from a text. — Read the rest