Happiness and the "default user"

Happiness and the "default user"

I propose the following question: Is it becoming increasingly difficult to achieve "happiness", in a society where all your habits, search queries, shopping trends, financial state, emotional state, contacts and so on are actively collected and processed for the simple goal of using it against you.

ACLU Sues to End ICE’s Rigged Algorithm for Detaining Immigrants

ACLU Sues to End ICE’s Rigged Algorithm for Detaining Immigrants

The risk assessment algorithm is supposed to provide a recommendation to ICE officers who are then meant to make the final decision, but the agency’s New York Field Office diverged from the algorithm’s ruling less than 1 percent of the time since 2017.

UCLA Abandons Plans to Use Facial Recognition After Backlash

UCLA Abandons Plans to Use Facial Recognition After Backlash

Ahead of a national day of action led by digital rights group Fight for the Future, UCLA has abandoned its plans to become the first university in the United States to adopt facial recognition technology.

Show me my data, and I’ll tell you who I am

Show me my data, and I’ll tell you who I am

The General Data Protection Regulation (GDPR) now gives Europeans the right to verify data held by individual companies, including marketing and advertising profiles.Companies can still protect their code and algorithms as business secrets, but in theory they can no longer hide personal data they generate about their users.

Facial Recognition Software Knows It Has Seen Man Before But Can’t Remember His Name

Facial Recognition Software Knows It Has Seen Man Before But Can’t Remember His Name

Damn it, I’m so bad with nonwhite faces.” Concluding that it was better to be safe than sorry, the anxious software has placed the man on several FBI watch lists.

Facebook isn’t free speech, it’s algorithmic amplification optimized for outrage

Facebook isn’t free speech, it’s algorithmic amplification optimized for outrage

What you read on Facebook is determined entirely by Facebook’s algorithm, which elides much — censors much, if you wrongly think the News Feed is free speech — and amplifies little.

Algorithms Are People

Algorithms Are People

Amazon admits it takes profitability into account when displaying products, but it denies reworking its search tool to privilege its own products over the competition.In an emailed statement to The Atlantic, an Amazon spokesperson wrote, “The fact is that we have not changed the criteria we use to rank search results to include profitability.

Government Agency Known for Its Bonkers Tech Now Tasked With Solving Fake News

Government Agency Known for Its Bonkers Tech Now Tasked With Solving Fake News

The program, called Semantics Forensics (SemaFor), effectively wants to figure out an automated system that will identify and defend against disinformation campaigns, including text, audio, image, and video content.According to the SemaFor announcement, the program wants to develop a bunch of algorithms that will analyze these coordinated attacks.

Explainer: What is post-quantum cryptography?

Explainer: What is post-quantum cryptography?

A report on quantum computing published last year by the US National Academies of Sciences, Engineering, and Medicine predicted that a powerful quantum computer running Shor’s algorithm would be capable of cracking a 1,024-bit implementation of RSA in less than a day.

MPs Call on Facial Recognition Trials to be Suspended

MPs Call on Facial Recognition Trials to be Suspended

In a report published this week, the House of Commons Science and Technology committee voiced serious concerns over the accuracy of the invasive technology and raised questions over bias – an issue which has been brought up repeatedly in discussions over the technology’s use.

Unproven aggression detectors, more surveillance

Unproven aggression detectors, more surveillance

In some public places, such as schools and hospitals, microphones installed with software listen for noise that sounds like aggression. It sounds useful, but in practice, the detection algorithms might not be ready yet.

Aggression Detectors: The Unproven, Invasive Surveillance Technology Schools Are Using to Monitor Students

Aggression Detectors: The Unproven, Invasive Surveillance Technology Schools Are Using to Monitor Students

The students were helping ProPublica test an aggression detector that’s used in hundreds of schools, health care facilities, banks, stores and prisons worldwide, including more than 100 in the U.S. Sound Intelligence, the Dutch company that makes the software for the device, plans to open an office this year in Chicago, where its chief executive will be based.

The 'Surveillance Scores' Companies Use to Rip You Off Might Be Totally Illegal

The 'Surveillance Scores' Companies Use to Rip You Off Might Be Totally Illegal

Customer value scores, such as those used by major retailers like Walmart, enable retailers to render “instantaneous, automated judgments about a consumer that may result in consumers paying different prices for the same product based on how much profit the algorithm decides a particular consumer will produce,” according to the petition.

A Device to Detect 'Aggression' in Schools Often Misfires

A Device to Detect 'Aggression' in Schools Often Misfires

Although a Louroe spokesman said the detector doesn’t intrude on student privacy because it only captures sound patterns deemed aggressive, its microphones allow administrators to record, replay and store those snippets of conversation indefinitely.“It’s not clear it’s solving the right problem.

What Companies Would Owe You If You Actually Owned Your Data

What Companies Would Owe You If You Actually Owned Your Data

Visit a website (desktop or mobile): $1 Buy something with a credit card or any other electronic transaction: $5 Click a link from one website to another: $2 Click on an ad on a website: $3 Drive somewhere with your phone: $5 Visit a brick and mortar store: $10 These prices assume that there is a market place where interested parties could bid on data bundles, of which your data is included.

How I Tried to Defy the Facebook Algorithm

How I Tried to Defy the Facebook Algorithm

The tool has directed me to corners of Facebook that feel like mini-vacations from the usual onslaught of life updates and political news: pages devoted to intellectual-property rights, items for sale in small-town Maryland, and the apparently beloved 20th-century organist Virgil Fox. This approach to browsing can work on other social-media platforms, too.

This colorful printed patch makes you pretty much invisible to AI

This colorful printed patch makes you pretty much invisible to AI

They could be used to fool self-driving cars into reading a stop sign as a lamppost, for example, or they could trick medical AI vision systems that are designed to identify diseases.

How to Stop Amazon From Listening to Your Alexa Recordings

How to Stop Amazon From Listening to Your Alexa Recordings

According to a Bloomberg report , Amazon employs thousands of workers to transcribe recordings of Alexa users for the purpose of improving the voice assistant's recognition algorithm. You can review a number of things here, including our voice history, skill permissions, and other data settings.

IBM’s photo-scraping scandal shows what a weird bubble AI researchers live in

IBM’s photo-scraping scandal shows what a weird bubble AI researchers live in

On Tuesday, NBC published a story with a gripping headline: “Facial recognition’s ‘dirty little secret’: Millions of online photos scraped without consent.” I linked to it in our last Algorithm issue, but it’s worth a revisit today.

P2P mesh routing

P2P mesh routing

It would be impossible to implement one these protocols in order to create and maintain such a net as Netsukuku is, where every each node is a router by itself, because the map of all the routes would require a space, on each pc connected to the net, of about 10GB.

US red lines for digital trade with the UK cause alarm

US red lines for digital trade with the UK cause alarm

| Javier Ruiz US red lines for digital trade with the UK cause alarm The US government has published its negotiating objectives for a trade deal with the UK, which include some worrying proposals on digital trade, including a ban on the disclosure of source code and algorithms, and potential restrictions on data protection.

When Facial Recognition Is Used to Identify Defendants, They Have a Right to Obtain Information About the Algorithms Used on Them, EFF Tells Court

When Facial Recognition Is Used to Identify Defendants, They Have a Right to Obtain Information About the Algorithms Used on Them, EFF Tells Court

We urged the Florida Supreme Court yesterday to review a closely-watched lawsuit to clarify the due process rights of defendants identified by facial recognition algorithms used by law enforcement.

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

While this algorithm is efficient and fast, there have been recent improvements in attacks (PDF Warning) against the signature scheme GeMSS is based on that suggest that there may be problems that could surface with more research.

ETS Isn't TLS and You Shouldn't Use It

ETS Isn't TLS and You Shouldn't Use It

Knowledge of a given static Diffie-Hellman private key can be used to decrypt all sessions encrypted with that key." In earlier versions of TLS and SSL, forward secrecy was an optional feature.

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

NTRU Prime NTRU Prime is a NTRU based lattice cryptosystem that attempts to improve on the original NTRU design by eliminating weaknesses in the structure of the rings used in older NTRU systems.

Tor traffic from individual Android apps detected with 97 percent accuracy

Tor traffic from individual Android apps detected with 97 percent accuracy

Image: ZDNet, Tor Project Italian academics say they've developed an algorithm that can detect the patterns of Android app activity inside Tor traffic with an accuracy of 97 percent.

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation.

NIST Round 2 and Post-Quantum Cryptography (part 1)

NIST Round 2 and Post-Quantum Cryptography (part 1)

This means that a breakdown of the asymmetric session at the beginning of the connection, leads to the attacker being able to read the secret key for AES, which breaks the encryption for the rest of the connection.

BEAM vs. Grin: A Complete Comparrison – Real Simple Crypto

BEAM vs. Grin: A Complete Comparrison – Real Simple Crypto

As BEAM and Grin have started taking their first steps as live implementations of the MimbleWimble protocol, however, questions have begun to come up about what each project aims to do, how they aim to do it, and the groups behind them.

Your digital identity has three layers, and you can only protect one of them

Your digital identity has three layers, and you can only protect one of them

It is shaped by technology companies and advertisers who make key decisions based on their interpretation of seemingly benign data points: what movies you choose to watch, the time of day you tweet, or how long you take to click on a cat video.