Internet Meme Pioneer YTMND Shuts Down

You’re the Man Now Dog, a pioneer in the internet meme space, has shut down.

The online community at YTMND.com allowed users to upload an image or a GIF and pair it with audio for hilarious results. Traffic to the website, however, dried up years ago with the rise of Facebook, Twitter, and YouTube. In 2016, site creator Max Goldberg said YTMND would likely shut down soon due to declining ad revenue and his ill health.

“It seems like the internet has moved on,” Goldberg told Gizmodo at the time.

The site dates back to 2001 when Goldberg paired a looping audio clip of Sean Connery uttering the line “You’re the man now, dog!” with some text and placed it all on a webpage, Yourethemannowdog.com.

In 2004, Goldberg expanded on that with a site that let users pair images with audio, so they could create clips and post them online. The end result was YTMND, which by 2006 was reportedly amassing 4 million visitors a month and 120,000 contributors. By 2012, it had almost a million pages devoted to user-created memes. But it couldn’t compete with the rise of social media and the smartphone.

What prompted Goldberg to finally pull the plug on the site in recent days isn’t clear. He and the site didn’t immediately respond to a request for comment. However, all the pages have been saved on the Internet Archive and its Wayback Machine. So you’ll still be able to enjoy all the site’s content for nostalgia’s sake.

Source: Internet Meme Pioneer YTMND Shuts Down | News & Opinion | PCMag.com

A real real shame

Cambridge scientists create world’s first living organism with fully redesigned DNA

The lab-made microbe, a strain of bacteria that is normally found in soil and the human gut, is similar to its natural cousins but survives on a smaller set of genetic instructions.

The bug’s existence proves life can exist with a restricted genetic code and paves the way for organisms whose biological machinery is commandeered to make drugs and useful materials, or to add new features such as virus resistance.

In a two-year effort, researchers at the laboratory of molecular biology, at Cambridge University, read and redesigned the DNA of the bacterium Escherichia coli (E coli), before creating cells with a synthetic version of the altered genome.

[…]

The Cambridge team set out to redesign the E coli genome by removing some of its superfluous codons. Working on a computer, the scientists went through the bug’s DNA. Whenever they came across TCG, a codon that makes an amino acid called serine, they rewrote it as AGC, which does the same job. They replaced two more codons in a similar way.

More than 18,000 edits later, the scientists had removed every occurrence of the three codons from the bug’s genome. The redesigned genetic code was then chemically synthesised and, piece by piece, added to E coli where it replaced the organism’s natural genome. The result, reported in Nature, is a microbe with a completely synthetic and radically altered DNA code. Known as Syn61, the bug is a little longer than normal, and grows more slowly, but survives nonetheless.

Source: Cambridge scientists create world’s first living organism with fully redesigned DNA | Science | The Guardian

22 EU Member States sign new military mobility programme

In the margins of today’s EDA Steering Board, 22 Member States (Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Estonia, France, Greece, Hungary, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Poland, Portugal, Romania, Slovakia, Spain, Sweden) and EDA signed a new programme that will facilitate the granting of cross-border surface and air movement permissions. The programme is developed in the framework of EDA’s work on military mobility. It implements an important part of the ‘Action Plan on Military Mobility’ which was presented by the High Representative of the Union for Foreign Affairs and Security Policy (HR) and the Commission to the European Parliament and the Council in March 2018. Military mobility is also highlighted in the EU-NATO Joint Declaration signed in Warsaw in 2016.

The purpose of the programme signed today is to harmonise different national regulations of the participating Member States. It should allow Member States to reduce the administrative burden associated with different permission procedures and thus significantly shorten the timelines for granting surface and air cross border movement permissions. The programme provides the basis for important activities at technical and procedural level to develop the necessary arrangements for cross border movement per transport mode during crises, preparations for crises, training and day-to-day business. The arrangements cover surface (road, rail and inland waterways) and air movements (Remotely Piloted Aircraft Systems, fighter aircraft or helicopters). They are expected to be finalised in 2020.

Source: 22 Member States sign new military mobility programme

3D Holographic Air Fan Displays

 

  • TOP-NOTCH 3D EFFECT – The image has no borders and backgrounds,makes you feel it completely appears in the air and creates best attraction for your products or events.Widely used in department store,shopping mall,casino,bars,railway station signage display
  • 🔥EYE-CATCHING BLACK TECH PRODUCT – Stand out from your competitors.Holo One is far beyond being “just a cool thing”. It is a comprehensive solution that can be seamlessly integrated into your business delivering you a complete media planning system and helping you outshine industry competition.
  • 🔥MAIN PARAMETERS – 224pcs led lights,8G Kingston SD Card( be careful when inserting the card slot) , display support format: MP4, AVI, RMVB, MKV, GIF, JPG, PNG with a black background.Software compatible with Windows XP / Windows 7 / Windows 8 / Windows 10(NOT SUPPORT MAC BOOK).Resolution is 450*224 px

https://www.amazon.com/GIWOX-Hologram-Advertising-Display-Holographic/dp/B077YD59RN

Adobe: If You Use Old Apps, You May Be Violating Third-Party Copyrights, highlighting the problem that you don’t own anything in the Cloud

Last week, Adobe said that older versions of Creative Cloud apps—including Photoshop and Lightroom—would no longer be available to subscribers. This week, some users are getting messages from Adobe warning they could be at “risk of potential claims of infringement by third parties” should they continue to use outdated versions of their apps.

The new language on “third-party infringement” is an interesting development. In a blog, Adobe explained that Creative Cloud subscribers would only have access to the two most recent versions of its software. However, it didn’t really give a reason besides the boilerplate explanation that newer versions promised “optimal performance and benefits.”

In an email to Gizmodo, an Adobe spokesperson provided the following statement:

“Adobe recently discontinued certain older versions of Creative Cloud applications. Customers using those versions have been notified that they are no longer licensed to use them and were provided guidance on how to upgrade to the latest authorized versions. Unfortunately, customers who continue to use or deploy older, unauthorized versions of Creative Cloud may face potential claims of infringement by third parties. We cannot comment on claims of third-party infringement, as it concerns ongoing litigation.”

While Adobe won’t spill on which “third-party” might hold you liable for using old software, the company is currently being sued by Dolby for copyright infringement. Basically, a legal complaint from March details that Adobe licensed some technology from Dolby for its applications. Prior to Creative Cloud, the two companies struck a deal based on the number of discs sold for certain apps. However, the complaint alleges Adobe got cagey with its numbers once it switched over to the cloud.

Essentially, it was easy for Adobe to report sales when it was selling its software on physical discs. However, the way Creative Cloud works, creatives can pay one subscription fee to gain access to various programs. Meaning, one subscription gets you access to multiple programs with Dolby’s tech—except Dolby got paid only once. For example, the complaint details that Adobe’s Master Collection is advertised as one product, but actually contains “four products that each have a separate and independent copy of Dolby Technology” and that each requires its own royalty.

What this actually has to do with Creative Cloud subscribers is murky. After all, it’s not their fault if they were sold licenses for programs they didn’t actually have access to. It’s not abundantly clear if the Dolby case is the exact reason why Adobe has decided to stop allowing access to older versions of its software—but the infringement language makes it a distinct possibility. If it is the reason, however, it’s also some fuzzy logic to penalize creatives for some alleged corporate royalty dodging when many have been faithfully paying their subscription fees.

And before you think “Well, just update then?”, it’s important to note that there are lots of reasons why a creative may choose to use an older version of software. For instance, they may be operating on older computers that don’t have the specs to run increasingly bloated software. And while cloud-based services definitely have their benefits, it does highlight the issue that you essentially do not own the software you’re paying for—unlike with previous physical copies.

Still, there’s not much that creators can do aside from updating, finding alternative programs, or pulling out their favorite eyepatch and resorting to some good old fashioned piracy. Or, you could take to the internet to vent frustration in the form of some very good Adobe memes.

Source: Adobe: If You Use Old Apps, You May Be Violating Third-Party Copyrights

It’s 2019 and a WhatsApp call can hack a phone: Zero-day exploit infects mobes with spyware

A security flaw in WhatsApp can be, and has been, exploited to inject spyware into victims’ smartphones: all a snoop needs to do is make a booby-trapped voice call to a target’s number, and they’re in. The victim doesn’t need to do a thing other than leave their phone on.

The Facebook-owned software suffers from a classic buffer overflow weakness. This means a successful hacker can hijack the application to run malicious code that pores over encrypted chats, eavesdrops on calls, turns on the microphone and camera, accesses photos, contacts, and other information on a handheld, and potentially further compromises the device. Call logs can be altered, too, to hide the method of infection.

[…]

Engineers at Facebook scrambled over the weekend to patch the hole, designated CVE-2019-3568, and freshly secured versions of WhatsApp were pushed out to users on Monday. If your phone offers to update WhatsApp for you, do it, or check for new versions manually.

Source: It’s 2019 and a WhatsApp call can hack a phone: Zero-day exploit infects mobes with spyware • The Register

Smallest pixels ever created, a million times smaller than on smartphones, could light up color-changing buildings

The smallest pixels yet created—a million times smaller than those in smartphones, made by trapping particles of light under tiny rocks of gold—could be used for new types of large-scale flexible displays, big enough to cover entire buildings.

The colour pixels, developed by a team of scientists led by the University of Cambridge, are compatible with roll-to-roll fabrication on flexible plastic films, dramatically reducing their production cost. The results are reported in the journal Science Advances.

It has been a long-held dream to mimic the colour-changing skin of octopus or squid, allowing people or objects to disappear into the natural background, but making large-area flexible display screens is still prohibitively expensive because they are constructed from highly precise multiple layers.

At the centre of the pixels developed by the Cambridge scientists is a tiny particle of gold a few billionths of a metre across. The grain sits on top of a reflective surface, trapping light in the gap in between. Surrounding each grain is a thin sticky coating which changes chemically when electrically switched, causing the to change colour across the spectrum.

The team of scientists, from different disciplines including physics, chemistry and manufacturing, made the pixels by coating vats of golden grains with an active polymer called polyaniline and then spraying them onto flexible mirror-coated plastic, to dramatically drive down production cost.

The pixels are the smallest yet created, a million times smaller than typical smartphone pixels. They can be seen in bright sunlight and because they do not need constant power to keep their set colour, have an energy performance that make large areas feasible and sustainable. “We started by washing them over aluminized food packets, but then found aerosol spraying is faster,” said co-lead author Hyeon-Ho Jeong from Cambridge’s Cavendish Laboratory.

“These are not the normal tools of nanotechnology, but this sort of radical approach is needed to make sustainable technologies feasible,” said Professor Jeremy J Baumberg of the NanoPhotonics Centre at Cambridge’s Cavendish Laboratory, who led the research. “The strange physics of light on the nanoscale allows it to be switched, even if less than a tenth of the film is coated with our active pixels. That’s because the apparent size of each pixel for light is many times larger than their physical area when using these resonant gold architectures.”

The pixels could enable a host of new application possibilities such as building-sized display screens, architecture which can switch off solar heat load, active camouflage clothing and coatings, as well as tiny indicators for coming internet-of-things devices.

The team are currently working at improving the colour range and are looking for partners to develop the technology further.

Source: Smallest pixels ever created could light up color-changing buildings

‘Seasteader’ Now on the Run For His Life from Thai Authorities who overran their seastead

An American bitcoin trader and his girlfriend became the first couple to actually live on a “seastead” — a 20-meter octagon floating in international waters a full 12 nautical miles from Thailand.

Long-time Slashdot reader SonicSpike shared this article from the libertarian Foundation for Economic Education describing what happened next: [W]hile they got to experience true sovereignty for a handful of weeks, their experiment was cut short after the Thai government declared that their seastead was a threat to its national sovereignty… Asserting that [their seastead] “Exly” was still within Thailand’s 200-mile exclusive economic zone, the government made plans to charge the couple with threatening Thailand’s national sovereignty, a crime punishable by death. However, before the Thai Navy could come detain the couple, they were tipped off and managed to escape. They are now on the run, fleeing for their lives.
Venture capitalist and PayPal co-founder Peter Thiel has donated over $1 million to the Seasteading Institute — though news about this first experiment must be discouraging. “We lived on a floating house boat for a few weeks and now Thailand wants us killed,” one of the seasteaders posted on his Facebook feed.

Last week the Arizona Republic reported that since the Thai government dismantled his ocean home, he’s been “on the run” for over two weeks.

Source: Bitcoin-Trading ‘Seasteader’ Now on the Run For His Life – Slashdot

New study shows scientists who selfie garner more public trust

The study builds on seminal work by Princeton University social psychologist Susan Fiske suggesting that scientists have earned Americans’ respect but not their trust. Trust depends on two perceived characteristics of an individual or social group: competence and warmth. Perceptions of competence involve the belief that members of a particular social group are intelligent and have the skills to achieve their goals. Perceptions of warmth involve the belief that the members of this group also have benevolent goals, or that they are friendly, altruistic, honest and share common values with people outside of their group. Together, perceptions of competence and warmth determine all group stereotypes, including stereotypes of scientists.

“Scientists are famously competent—people report we’re smart, curious, lab nerds—but they’re silent about scientists’ more human qualities,” Fiske said.

While perceptions of both the competence and the warmth of members of a are important in determining trust and even action, it turns out that perceived warmth is more important. And, as Fiske showed in a study published in 2014 in Proceedings of the National Academy of Sciences, Americans see scientists as competent but only as moderately warm. Scientists’ perceived warmth is on par with that of retail workers, bus drivers and construction workers but far below that of doctors, nurses and teachers.

The researchers of the new PLOS ONE study launched the investigation into perceptions of scientist Instagrammers after being struck with the idea that the competence versus warmth stereotype of scientists may not be an insurmountable challenge given the power of social media to bring scientists and nonscientists together.

[…]

To explore this idea, the team launched a popularly referred to as ScientistsWhoSelfie, based on the hashtag the researchers introduced to raise awareness about the project in an online crowdfunding campaign that raised more than $10,000. A few dozen scientists around the globe helped to develop a series of images for the project.

The idea was to show research participants images published to one of four different “Scientists of Instagram” rotation-curation accounts and then to ask them questions about their perceptions of the scientists represented in these images as well as of scientists in general. Each participant was shown three types of images: a scientific setting or a piece of equipment such as a microscope, a bioreactor on the lab bench or a plant experiment set-up in a greenhouse with no humans in any of the images but with captions attributing the images to either male or female scientists by name; a smiling male scientist looking at the camera in the same scientific setting; or a smiling female scientist looking at the camera in the same scientific setting.

A total of 1,620 U.S.-representative participants recruited online viewed these images in an online survey. People who saw images including a scientist’s smiling face, or “scientist selfies,” evaluated the scientists in the images and scientists in general as significantly warmer than people who saw control images or images of scientific environments or equipment that did not include a person. This perception of scientists as warm was especially prominent among people who saw images featuring a female scientist’s face, as female scientists in selfies were evaluated as significantly warmer than male scientists in selfies or science-only images. There was also a slight increase in the perceived competence of female scientists in selfies. Competence cues such as lab coats and equipment likely played a role in preserving the perceived competence of scientists in selfies.

“Seeing scientist selfies, but not images of scientific objects posted by scientists online, boosted perceptions that scientists are both competent and warm,” said lead author LSU alumna Paige Jarreau, who is a former LSU science communication specialist and current director of social media and science communication at LifeOmic. “We think this is because people who viewed science images with a scientist’s face in the picture began to see these scientist communicators on Instagram not as belonging to some unfamiliar group of stereotypically socially inept geniuses, but as individuals and even as ‘everyday’ people with ‘normal’ interests—people who, like us, enjoy taking selfies! Female scientists, in particular, when represented in substantial numbers and diversity, may cause viewers to re-evaluate stereotypical perceptions of who a scientist is.”

The team further found that seeing a series of female scientist selfies on Instagram significantly shifted gender-related science stereotypes, namely those that associate STEM fields with being male. However, they also found that people who saw female scientist selfies evaluated these scientists as significantly more attractive than male scientist selfies. This might help explain female scientists’ boosted warmth evaluations, as physical attractiveness is positively associated with perceived warmth. However, this could also be an indicator that viewers focused more on the physical appearance of female scientists than on male scientists. By extension, female scientists could be more unfairly evaluated for defying gender norms in their selfies, such as not smiling or appearing warm. In their PLOS ONE paper, the team writes that this possibility should be investigated further in future research.

Source: New study shows scientists who selfie garner more public trust

New Intel firmware boot verification bypass enables low-level persistent backdoors

Researchers have found a new way to defeat the boot verification process for some Intel-based systems, but the technique can also impact other platforms and can be used to compromise machines in a stealthy and persistent way.

Researchers Peter Bosch and Trammell Hudson presented a time-of-check, time-of-use (TOCTOU) attack against the Boot Guard feature of Intel’s reference Unified Extensible Firmware Interface (UEFI) implementation at the Hack in the Box conference in Amsterdam this week.

Boot Guard is a technology that was added in Intel Core 4th generation microarchitecture — also known as Haswell — and is meant to provide assurance that the low-level firmware (UEFI) has not been maliciously modified. It does this by checking that the loaded firmware modules are digitally signed with trusted keys that belong to Intel or the PC manufacturer every time the computer starts.

[…

While the attack requires opening the laptop case to attach clip-on connectors to the chip, there are ways to make it permanent, such as replacing the SPI chip with a rogue one that emulates the UEFI and also serves malicious code. In fact, Hudson has already designed such an emulator chip that has the same dimensions as a real SPI flash chip and could easily pass as one upon visual inspection if some plastic coating is added to it.

[…]

The Intel Boot Guard and Secure Boot features were created to prevent attackers from injecting malware into the UEFI or other components loaded during the booting process such as the OS bootloader or the kernel. Such malware programs have existed for a long time and are called boot rootkits, or bootkits, and attackers have used them because they are very persistent and hard to remove. That’s because they re-infect the operating system after every reboot before any antivirus program has a chance to start and detect them.

In its chip-swapping variant, Hudson’s and Bosch’s attack acts like a persistent hardware-based bootkit. It can be used to steal disk encryption passwords and other sensitive information from the system and it’s very hard to detect without opening the device and closely inspecting its motherboard.

Even though such physical attacks require a targeted approach and will never be a widespread threat, they can pose a serious risk to businesses and users who have access to valuable information.

[…]

The problem is that distributing UEFI patches has never been an easy process. Intel shares its UEFI kit with UEFI/BIOS vendors who have contracts with various PC manufacturers. Those OEMs then make their own firmware customizations before they ship it inside their products. This means that any subsequent fixes require collaboration and coordination from all involved parties, not to mention end users who need to actually care enough to install those UEFI updates.

The patches for the critical Meltdown and Spectre vulnerabilities that affected Intel CPUs also required UEFI updates and it took months for some PC vendors to release them for their affected products. Many models never received the patches in the form of UEFI updates because their manufacturers no longer supported them.

The two researchers plan to release their proof-of-concept code in the following months as part of a tool called SPISpy that they hope will help other researchers and interested parties to check if their own machines are vulnerable and to investigate similar issues on other platforms.

“I would really like to see the industry move towards opening the source to their firmware, to make it more easy to verify its correctness and security,” says Bosch.

Source: New Intel firmware boot verification bypass enables low-level backdoors | CSO Online

Over 275 Million Indian Personal Records Exposed by Unsecured MongoDB Database

A huge MongoDB database exposing 275,265,298 records of Indian citizens containing detailed personally identifiable information (PII) was left unprotected on the Internet for more than two weeks.

Security Discovery researcher Bob Diachenko discovered the publicly accessible MongoDB database hosted on Amazon AWS using Shodan, and as historical data provided by the platform showed, the huge cache of PII data was first indexed on April 23, 2019.

As he found out after further investigation, the exposed data included information such as name, gender, date of birth, email, mobile phone number, education details, professional info (employer, employment history, skills, functional area), and current salary for each of the database records.

[…]

Additionally, the names of the data collections stored within the database suggested that the entire cache of resumes was collected “as part of a massive scraping operation” for unknown purposes.

Database stats
Exposed database contents

The researcher “immediately notified Indian CERT team on the incident, however, database remained open and searchable until today, May 8th, when it got dropped by hackers known as ‘Unistellar’ group.”

After the database got dropped by the hackers, Diachenko discovered the following message left behind after deleting all the data:

The message left by the hackers
The message left by the hackers

Diachenko found multiple other unsecured databases and servers, unearthing a publicly accessible 140+ GB MongoDB database containing a huge collection of 808,539,939 email records during Early-March and another one with over 200 million records with resumes from Chinese job seekers in January.

He was also the one who discovered the personal information of more than 66 million individuals left out in the open on the Internet during December and an extra 11 million records during September, with all of them being stored in misconfigured and passwordless MongoDB instances.

These data leaks are a thing because a lot of MongoDB databases are left publicly accessible by their owners and are not properly secured. This means that they can be blocked by securing the database instance.

Source: Over 275 Million Records Exposed by Unsecured MongoDB Database

Facebook co-founder pleading to break it up in long letter to NYT

The company’s mistakes — the sloppy privacy practices that dropped tens of millions of users’ data into a political consulting firm’s lap; the slow response to Russian agents, violent rhetoric and fake news; and the unbounded drive to capture ever more of our time and attention — dominate the headlines. It’s been 15 years since I co-founded Facebook at Harvard, and I haven’t worked at the company in a decade. But I feel a sense of anger and responsibility.

[…]

he’s [Mark -ed] human. But it’s his very humanity that makes his unchecked power so problematic.

Mark’s influence is staggering, far beyond that of anyone else in the private sector or in government. He controls three core communications platforms — Facebook, Instagram and WhatsApp — that billions of people use every day. Facebook’s board works more like an advisory committee than an overseer, because Mark controls around 60 percent of voting shares. Mark alone can decide how to configure Facebook’s algorithms to determine what people see in their News Feeds, what privacy settings they can use and even which messages get delivered. He sets the rules for how to distinguish violent and incendiary speech from the merely offensive, and he can choose to shut down a competitor by acquiring, blocking or copying it.

[…]

Facebook’s board works more like an advisory committee than an overseer, because Mark controls around 60 percent of voting shares. Mark alone can decide how to configure Facebook’s algorithms to determine what people see in their News Feeds, what privacy settings they can use and even which messages get delivered. He sets the rules for how to distinguish violent and incendiary speech from the merely offensive, and he can choose to shut down a competitor by acquiring, blocking or copying it.

[…]

I’m worried that Mark has surrounded himself with a team that reinforces his beliefs instead of challenging them.

[…]

After Mark’s congressional testimony last year, there should have been calls for him to truly reckon with his mistakes. Instead the legislators who questioned him were derided as too old and out of touch to understand how tech works. That’s the impression Mark wanted Americans to have, because it means little will change.

[…]

America was built on the idea that power should not be concentrated in any one person, because we are all fallible. That’s why the founders created a system of checks and balances. They didn’t need to foresee the rise of Facebook to understand the threat that gargantuan companies would pose to democracy.

[…]

For many people today, it’s hard to imagine government doing much of anything right, let alone breaking up a company like Facebook. This isn’t by coincidence.

Starting in the 1970s, a small but dedicated group of economists, lawyers and policymakers sowed the seeds of our cynicism. Over the next 40 years, they financed a network of think tanks, journals, social clubs, academic centers and media outlets to teach an emerging generation that private interests should take precedence over public ones.

[…]

This shift, combined with business-friendly tax and regulatory policy, ushered in a period of mergers and acquisitions that created megacorporations. In the past 20 years, more than 75 percent of American industries, from airlines to pharmaceuticals, have experienced increased concentration, and the average size of public companies has tripled. The results are a decline in entrepreneurship, stalled productivity growth, and higher prices and fewer choices for consumers.

[…]

Over a decade later, Facebook has earned the prize of domination. It is worth half a trillion dollars and commands, by my estimate, more than 80 percent of the world’s social networking revenue. It is a powerful monopoly, eclipsing all of its rivals and erasing competition from the social networking category. This explains why, even during the annus horribilis of 2018, Facebook’s earnings per share increased by an astounding 40 percent compared with the year before.

[…]

Facebook’s monopoly is also visible in its usage statistics. About 70 percent of American adults use social media, and a vast majority are on Facebook products. Over two-thirds use the core site, a third use Instagram, and a fifth use WhatsApp. By contrast, fewer than a third report using Pinterest, LinkedIn or Snapchat. What started out as lighthearted entertainment has become the primary way that people of all ages communicate online.

Note: These figures do not necessarily reflect unique users. They are based on monthly active users, active user accounts or unique monthly visitors, and are current as of April.

Source: Hootsuite and We Are Social, via DataReportal.com

By The New York Times

Even when people want to quit Facebook, they don’t have any meaningful alternative, as we saw in the aftermath of the Cambridge Analytica scandal. Worried about their privacy and lacking confidence in Facebook’s good faith, users across the world started a “Delete Facebook” movement. According to the Pew Research Center, a quarter deleted their accounts from their phones, but many did so only temporarily. I heard more than one friend say, “I’m getting off Facebook altogether — thank God for Instagram,” not realizing that Instagram was a Facebook subsidiary. In the end people did not leave the company’s platforms en masse. After all, where would they go?

[…]

When it hasn’t acquired its way to dominance, Facebook has used its monopoly position to shut out competing companies or has copied their technology.

The News Feed algorithm reportedly prioritized videos created through Facebook over videos from competitors, like YouTube and Vimeo. In 2012, Twitter introduced a video network called Vine that featured six-second videos. That same day, Facebook blocked Vine from hosting a tool that let its users search for their Facebook friends while on the new network. The decision hobbled Vine, which shut down four years later.

Snapchat posed a different threat. Snapchat’s Stories and impermanent messaging options made it an attractive alternative to Facebook and Instagram. And unlike Vine, Snapchat wasn’t interfacing with the Facebook ecosystem; there was no obvious way to handicap the company or shut it out. So Facebook simply copied it.

Facebook’s version of Snapchat’s stories and disappearing messages proved wildly successful, at Snapchat’s expense. At an all-hands meeting in 2016, Mark told Facebook employees not to let their pride get in the way of giving users what they want. According to Wired magazine, “Zuckerberg’s message became an informal slogan at Facebook: ‘Don’t be too proud to copy.’”

(There is little regulators can do about this tactic: Snapchat patented its “ephemeral message galleries,” but copyright law does not extend to the abstract concept itself.)

As a result of all this, would-be competitors can’t raise the money to take on Facebook. Investors realize that if a company gets traction, Facebook will copy its innovations, shut it down or acquire it for a relatively modest sum. So despite an extended economic expansion, increasing interest in high-tech start-ups, an explosion of venture capital and growing public distaste for Facebook, no major social networking company has been founded since the fall of 2011.

As markets become more concentrated, the number of new start-up businesses declines. This holds true in other high-tech areas dominated by single companies, like search (controlled by Google) and e-commerce (taken over by Amazon). Meanwhile, there has been plenty of innovation in areas where there is no monopolistic domination, such as in workplace productivity (Slack, Trello, Asana), urban transportation (Lyft, Uber, Lime, Bird) and cryptocurrency exchanges (Ripple, Coinbase, Circle).

[…]

Facebook’s business model is built on capturing as much of our attention as possible to encourage people to create and share more information about who they are and who they want to be. We pay for Facebook with our data and our attention, and by either measure it doesn’t come cheap.

I was on the original News Feed team (my name is on the patent), and that product now gets billions of hours of attention and pulls in unknowable amounts of data each year. The average Facebook user spends an hour a day on the platform; Instagram users spend 53 minutes a day scrolling through pictures and videos. They create immense amounts of data — not just likes and dislikes, but how many seconds they watch a particular video — that Facebook uses to refine its targeted advertising. Facebook also collects data from partner companies and apps, without most users knowing about it, according to testing by The Wall Street Journal.

[…]

The most problematic aspect of Facebook’s power is Mark’s unilateral control over speech. There is no precedent for his ability to monitor, organize and even censor the conversations of two billion people.

[…]

In 2014, the rules favored curiosity-inducing “clickbait” headlines. In 2016, they enabled the spread of fringe political views and fake news, which made it easier for Russian actors to manipulate the American electorate. In January 2018, Mark announced that the algorithms would favor non-news content shared by friends and news from “trustworthy” sources, which his engineers interpreted — to the confusion of many — as a boost for anything in the category of “politics, crime, tragedy.”

[…]

As if Facebook’s opaque algorithms weren’t enough, last year we learned that Facebook executives had permanently deleted their own messages from the platform, erasing them from the inboxes of recipients; the justification was corporate security concerns. When I look at my years of Facebook messages with Mark now, it’s just a long stream of my own light-blue comments, clearly written in response to words he had once sent me. (Facebook now offers this as a feature to all users.)

The most extreme example of Facebook manipulating speech happened in Myanmar in late 2017. Mark said in a Vox interview that he personally made the decision to delete the private messages of Facebook users who were encouraging genocide there. “I remember, one Saturday morning, I got a phone call,” he said, “and we detected that people were trying to spread sensational messages through — it was Facebook Messenger in this case — to each side of the conflict, basically telling the Muslims, ‘Hey, there’s about to be an uprising of the Buddhists, so make sure that you are armed and go to this place.’ And then the same thing on the other side.”

[…]

Mark made a call: “We stop those messages from going through.” Most people would agree with his decision, but it’s deeply troubling that he made it with no accountability to any independent authority or government. Facebook could, in theory, delete en masse the messages of Americans, too, if its leadership decided it didn’t like them.

Mark used to insist that Facebook was just a “social utility,” a neutral platform for people to communicate what they wished. Now he recognizes that Facebook is both a platform and a publisher and that it is inevitably making decisions about values. The company’s own lawyers have argued in court that Facebook is a publisher and thus entitled to First Amendment protection.

No one at Facebook headquarters is choosing what single news story everyone in America wakes up to, of course. But they do decide whether it will be an article from a reputable outlet or a clip from “The Daily Show,” a photo from a friend’s wedding or an incendiary call to kill others.

[…]

Mark may never have a boss, but he needs to have some check on his power. The American government needs to do two things: break up Facebook’s monopoly and regulate the company to make it more accountable to the American people.

Source: Opinion | It’s Time to Break Up Facebook – The New York Times

Unfortunately the vision given to break up the company is limited to forcing a forced sale of Instagram and Whatsapp, which isn’t far enough and the legal oversight proposals are a bit weak too, but the case building up to “something must be done” ™ are clear and convincing.

CIA’s Solution to Killing Too Many Civilians: Knife Bomb

The CIA and the U.S. military have been using a new type of missile during some drone strikes in recent years, according to a report in the Wall Street Journal. What makes this new missile unique? It doesn’t explode and instead deploys sharp blades, hitting targets “like a speeding anvil” from the sky.

The new missile, which has never been acknowledged publicly before today, is called the R9X and is a variant of the Hellfire missile. But unlike a traditional Hellfire, the R9X is designed with six long blades that only emerge from the missile seconds before impact. The R9X, nicknamed the “flying Ginsu” by insiders, doesn’t contain a warhead. The goal, according to anonymous U.S. officials speaking with the Journal, is to reduce unnecessary casualties and hopefully only kill the person who was targeted in the first place.

War reporters have been speculating that the U.S. military had a new kind of weapon since at least February 2017, when photos emerged following the death of Al Qaeda’s Abu Khayr al Masri in Syria. The terrorist, an Egyptian national, had been traveling in a Kia sedan that was surprisingly intact after the CIA drone strike, given the fact that it had just been hit with a missile.

The roof of the Kia was destroyed, and as journalist Tyler Rogoway reported at the time, the car “literally has a hole punched through its roof with no real sign of a large explosion.”

Another terrorist, Jamal al-Badawi, may have been targeted in Yemen using the new missile when he was killed in January of 2019. Al-Badawi helped orchestrate the 2000 bombing of the USS Cole that killed 17 sailors and wounded at least 40.

According to the Journal, the R9X was developed under President Barack Obama in an effort to reduce civilian deaths and has been in development since at least 2011. President Donald Trump has dialed back efforts to limit civilian casualties, even rescinding an Obama-era mandate to report civilian deaths by drones outside of war zones.

The R9X has been used maybe half a dozen times around the world, according to this new report, including in Libya, Syria, Iraq, Yemen, and Somalia. But those numbers could not be independently verified and public affairs officials at the U.S. Department of Defense did not immediately respond to Gizmodo’s request for comment this morning.

Source: CIA’s Solution to Killing Too Many Civilians: Knife Bomb

Failed SpaceX Parachute Test Is Yet Another Setback for NASA’s Crew Program

A recent parachute test of the SpaceX Crew Dragon capsule “was not satisfactory,” a NASA official said during a House subcommittee hearing yesterday. Few details were disclosed, but it’s now looking even less likely that NASA will have the capability to fly astronauts to space anytime soon.

The House Science, Space, and Technology Committee held a hearing in Washington, DC, yesterday to discuss NASA’s plans to go to the Moon, and how the accelerated lunar timeline might affect the larger goal of sending humans to Mars. During the meeting, however, the conversation turned to a previously undisclosed incident that happened last month at Nevada’s Delamar Dry Lake during a test of the SpaceX Crew Dragon parachute system.

“The test was not satisfactory,” replied Bill Gerstenmaier, NASA Associate Administrator for Human Exploration and Operations, in response to a question posed by Alabama Congressman Morris Brooks. “We did not get the results we wanted, but we learned some information that’s going to affect, potentially, future parachute designs,” said Gerstenmaier.

When asked what he meant by unwanted results, the NASA official said the testing apparatus was “damaged upon impact with the ground.”

In an email to Gizmodo, a SpaceX spokesperson confirmed the incident, saying it was an “advanced development test” designed to measure the stresses endured by the parachutes. Rather than use an actual Crew Dragon capsule, however, SpaceX used a simple metal test sled. During the test, the parachutes didn’t fully open and the sled hit the ground at “a higher than expected velocity,” according to the spokesperson, adding that no one was hurt and no property damage occurred at the test site.

[…]

As to the cause of the failure, Gerstenmaier was unable to provide an answer.

“We still need to understand whether it was a test setup configuration coming out of the aircraft or if there was something associated with the packing of the parachute, the rigging, all that,” he told the Committee. During the failed test, the loads within each parachute canopy were recorded, and this data will be used during the investigation, he said.

Source: Failed SpaceX Parachute Test Is Yet Another Setback for NASA’s Crew Program

Why do SpaceX tests fail so often? Would it have anything to do with the working culture Elon Musk instills everywhere he goes?

All Chromebooks will also be Linux laptops going forward – the catch: on top of Chrome OS in a VM container. So not really a linux laptop then.

At Google I/O in Mountain View, Google quietly let slip that “all devices [Chromebook] launched this year will be Linux-ready right out of the box.” Wait. What?

In case you’ve missed it, last year, Google started making it possible to run desktop Linux on Chrome OS. Since then, more Chromebook devices are able to run Linux. Going forward, all of them will be able to do so, too. Yes. All of them. ARM and Intel-based.

This isn’t surprising. Chrome OS, after all, is built on Linux. Chrome OS started as a spin off of Ubuntu Linux. It then migrated to Gentoo Linux and evolved into Google’s own take on the vanilla Linux kernel. But its interface remains the Chrome web browser UI — to this day.

Earlier, you could run Debian, Ubuntu and Kali Linux on Chrome OS using the open-source Crouton program in a chroot container. Or, you could run Gallium OS, a third-party, Xubuntu Chromebook-specific Linux variant. But it wasn’t easy.

Now? It’s as simple as simple can be. Just open the Chrome OS app switcher by pressing the Search/Launcher key and then type “Terminal”. This launches the Termina VM, which will start running a Debian 9.0 Stretch Linux container.

Congratulations! You’re now running Debian Linux on your Chromebook.

Source: All Chromebooks will also be Linux laptops going forward | ZDNet

Which means that you ‘re not really running Linux on the hardware, but in a Virtual Machine. Which means that Google sees everything you do.

Your Kid’s Echo Dot May Be Storing Data Even After You ‘Delete’ It

When Amazon launched its kid’s version of the Echo Dot smart speaker a year ago, we hoped it would be a technological blessing, rather than a curse. But as further proof that private information is no longer sacred, a complaint filed yesterday with the Federal Trade Commission alleges that the devices are unlawfully storing kids’ data—even after parents attempt to delete it.

Child and privacy advocacy groups—most notably the Campaign for a Commercial-Free Childhood (CCFC) and the Center for Digital Democracy—submitted a 96-page complaint with the FTC that alleges, in part, that:

  • Amazon’s process for reviewing personal information places undue burden on parents. (Parents cannot search through the information and must instead read or listen to every voice recording of their child’s interaction with the device in order to review.)
  • Amazon’s parental consent mechanism does not provide assurance that the person giving consent is the parent of the child.
  • Amazon does not disclose which “kid skills”—developed by third parties—collect child personal information or what they collect. It tells parents to read the privacy policy of each kid skill, but the vast majority did not provide individual privacy policies.
  • Amazon does not give notice or obtain parental consent before recording the voices of children who do not live in the home (visiting friends, family, etc.) with the owner of the device. They advertise having the technology to create voice profiles for customized user experiences but fail to use it to stop information collection from unrecognized children.
  • Amazon’s website and literature directs parents trying to delete information collected about their child to the voice recording deletion page and fails to disclose that deleting voice recordings does not delete the underlying information.
  • Amazon keeps children’s personal information longer than reasonably necessary. It only deletes information if a parent explicitly requests deletion by contacting customer service; otherwise it is retained forever.

To further prove its point, the CCFC performed a test in which a child told Alexa to “remember” a fake name, social security number, telephone number, address and food allergy. Alexa remembered and repeated the information, despite several attempts by an adult to delete or edit it.

In response to the complaint, an Amazon spokesperson said in an email, “FreeTime on Alexa and Echo Dot Kids Edition are compliant with the Children’s Online Privacy Protection Act (COPPA),” and directed users to more information on its privacy practices here.

Source: Your Kid’s Echo Dot May Be Storing Data Even After You ‘Delete’ It

Scientists Recreate Hallmark Quantum Physics Slit Experiment Using Antimatter

All matter particles have a corresponding antimatter particle, which shares most of the same properties but is a mirror image of the particle and has the opposite charge. Decades ago, scientists determined that when regular-matter particles pass through a pair of parallel slits, they create an interference pattern as if they were waves. The new experiment from researchers in Italy and Switzerland unsurprisingly affirms that antimatter behaves the same way—but conducting the research required overcoming some difficulties.

The double-slit experiment serves as a foundation for our understanding of matter. Light, when passed through a pair of parallel slits onto a photosensitive detector, reveals a pattern of bright and dark spots. This proves that light travels as a wave; it splits upon hitting the slits, and the waves either cancel each other out or magnify the strength of the signal, creating the pattern. Surprisingly, beams of matter particles like electrons will also form this diffraction pattern, even if you send the electrons one at a time. This demonstrates the probabilistic, dual wave-particle behavior of matter and light that is the foundation of quantum mechanics.

Physicists have already performed diffraction experiments on antimatter that demonstrate its dual wave-particle nature, but this is the first demonstration of a double-slit analog in antimatter, according to the paper published in Science Advances.

Antimatter is rarer than matter, but it exists here on Earth most commonly in the form of positrons, or anti-electrons, produced by certain kinds of radioactive decay. The Laboratory for Nanostructure Epitaxy and Spintronics on Silicon (L-NESS) facility in Italy produces a focused beam of approximately 5,000 positrons per second. The scientists shined the beam through two gold-coated silicon nitride gratings, each with a different distance between the grates. The beam then hit a detector, a 50-micrometer-thick gelatin full of silver bromide crystals, which served as a three-dimensional photographic film.

A recreation of the positions in the gel reveals evidence of the diffraction pattern.
Graphic: Sala et al (Science Advances)

Upon analyzing the results, the researchers found that the antimatter beam had produced evidence of the expected interference pattern, according to the paper. They concluded that positrons had hit the gratings, interacted with one another as matter waves, and produced the expected interference pattern on the film.

This is only a first step for the QUPLAS (QUantum interferometry with Positrons and LASers) program, which is devoted to performing these interference pattern-based studies on antimatter. They next plan to perform studies on other antimatter particles, like positronium (positrons bound to electrons in an exotic atom) and antihydrogen (an antiproton orbited by a positron). Eventually, they hope to use antimatter to make measurements of Earth’s gravitational field, and to see if other laws of physics hold up when tested on antimatter instead of the regular matter we know and love.

Source: Scientists Recreate Hallmark Quantum Physics Experiment Using Antimatter

DARPA wants to develop AI fighter program to augment human pilots

DARPA, the US military research arm, has launched a program to train fighter jets to engage in aerial battle autonomously with the help of AI algorithms.

The Air Combat Evolution (ACE) program seeks to create military planes that are capable of performing combat maneuvers for dogfighting without the help of human pilots. Vehicles won’t be completely unmanned, however. DARPA is more interested in forging stronger teamwork between humans and machines.

The end goal is to have autonomous jet controls that can handle tasks like dodging out the way of enemy fire at lightning speeds, while the pilot takes on more difficult problems like executing strategic battle commands and firing off weapons.

“We envision a future in which AI handles the split-second maneuvering during within-visual-range dogfights, keeping pilots safer and more effective as they orchestrate large numbers of unmanned systems into a web of overwhelming combat effects,” said Lieutenant Colonel Dan Javorsek, ACE program manager.

It’s part of DARPA’s larger vision of “mosaic warfare.” The idea here is that combat is fought by a mixture of manned and unmanned systems working together. The hope is these unmanned systems can be rapidly developed, and are easily adaptable through technological upgrades so that they can help the military cope with changing conditions.

“Linking together manned aircraft with significantly cheaper unmanned systems creates a ‘mosaic’ where the individual ‘pieces’ can easily be recomposed to create different effects or quickly replaced if destroyed, resulting in a more resilient warfighting capability,” DARPA said in a statement.

The ACE program will initially focus on teaching AI in a similar way that new pilots are trained. Computer vision algorithms will learn basic battle maneuvers for close one-on-one combat. “Only after human pilots are confident that the AI algorithms are trustworthy in handling bounded, transparent and predictable behaviors will the aerial engagement scenarios increase in difficulty and realism,” Javorsek said.

“Following virtual testing, we plan to demonstrate the dogfighting algorithms on sub-scale aircraft leading ultimately to live, full-scale manned-unmanned team dogfighting with operationally representative aircraft.”

DARPA is welcoming R&D proposals from academics and companies for its program and will fund the effort. Successful candidates will engage in the “AlphaDogfight Trials,” where these AI-crafter fighter planes will test one another in a competition to find the best algorithm.

“Being able to trust autonomy is critical as we move toward a future of warfare involving manned platforms fighting alongside unmanned systems,” said Javorsek.

Source: Take my bits awaaaay: DARPA wants to develop AI fighter program to augment human pilots • The Register

Manning immediately ordered to appear before new U.S. grand jury as she is freed from jail

Former U.S. Army intelligence analyst Chelsea Manning, who was being detained for refusing to testify before a grand jury, was released on Thursday and immediately summoned to appear before a new grand jury next week, her lawyers said.

[…]

Manning was released after the term expired for the previous grand jury in Virginia that was seeking her testimony in connection with what is believed to be the government’s long-running investigation into WikiLeaks and its founder Julian Assange.

She was simultaneously subpoenaed to appear before a different grand jury on May 16, meaning she could be found in contempt again for refusing to testify and returned to jail, her lawyers said in a statement.

Manning had appeared before the grand jury in early March but declined to answer questions.

She was jailed for 62 days for contempt of court. A U.S. appeals court denied her request to be released on bail and upheld the lower court’s decision to hold her in civil contempt for refusing to testify.

“Chelsea will continue to refuse to answer questions, and will use every available legal defense to prove to District Judge (Anthony) Trenga that she has just cause for her refusal to give testimony,” the statement said.

It is unclear exactly why federal prosecutors want Manning to testify, although her representatives say the questions she was asked concern the release of information she disclosed to the public in 2010 through WikiLeaks.

Source: Manning ordered to appear before new U.S. grand jury as she is freed from jail – Reuters

Nice one, democracy. Not.

The Role of Luck in Life Success Is Far Greater Than We Realized – Scientific American Blog Network

There is a deep underlying assumption, however, that we can learn from them because it’s their personal characteristics–such as talent, skill, mental toughness, hard work, tenacity, optimism, growth mindset, and emotional intelligence– that got them where they are today.

[…]

But is this assumption correct? I have spent my entire career studying the psychological characteristics that predict achievement and creativity. While I have found that a certain number of traits— including passion, perseverance, imagination, intellectual curiosity, and openness to experience– do significantly explain differences in success, I am often intrigued by just how much of the variance is often left unexplained.

In recent years, a number of studies and books–including those by risk analyst Nassim Taleb, investment strategist Michael Mauboussin, and economist Robert Frank— have suggested that luck and opportunity may play a far greater role than we ever realized, across a number of fields, including financial trading, business, sports, art, music, literature, and science. Their argument is not that luck is everything; of course talent matters. Instead, the data suggests that we miss out on a really importance piece of the success picture if we only focus on personal characteristics in attempting to understand the determinants of success.

[…]

Consider some recent findings:

The importance of the hidden dimension of luck raises an intriguing question: Are the most successful people mostly just the luckiest people in our society? If this were even a little bit true, then this would have some significant implications for how we distribute limited resources, and for the potential for the rich and successful to actually benefit society (versus benefiting themselves by getting even more rich and successful).

[…]

Many meritocratic strategies used to assign honors, funds, or rewards are often based on the past success of the person. Selecting individuals in this way creates a state of affairs in which the rich get richer and the poor get poorer (often referred to as the “Matthew effect“). But is this the most effective strategy for maximizing potential? Which is a more effective funding strategy for maximizing impact to the world: giving large grants to a few previously successful applicants, or a number of smaller grants to many average-successful people? This is a fundamental question about distribution of resources, which needs to be informed by actual data.

Consider a study conducted by Jean-Michel Fortin and David Currie, who looked at whether larger grants lead to larger discoveries. They found a positive, but only very small relationship between funding and impact (as measured by four indices relating to scientific publications). What’s more, those who received a second grant were not more productive than those who only received a first grant, and impact was generally a decelerating function of funding.

[…]

the best funding strategy of them all was one where an equal number of funding was distributed to everyone. Distributing funds at a rate of 1 unit every five years resulted in 60% of the most talented individuals having a greater than average level of success, and distributing funds at a rate of 5 units every five years resulted in 100% of the most talented individuals having an impact! This suggests that if a funding agency or government has more money available to distribute, they’d be wise to use that extra money to distribute money to everyone, rather than to only a select few

[…]

The results of this elucidating simulation, which dovetail with a growing number of studies based on real-world data, strongly suggest that luck and opportunity play an underappreciated role in determining the final level of individual success. As the researchers point out, since rewards and resources are usually given to those who are already highly rewarded, this often causes a lack of opportunities for those who are most talented (i.e., have the greatest potential to actually benefit from the resources), and it doesn’t take into account the important role of luck, which can emerge spontaneously throughout the creative process. The researchers argue that the following factors are all important in giving people more chances of success: a stimulating environment rich in opportunities, a good education, intensive training, and an efficient strategy for the distribution of funds and resources. They argue that at the macro-level of analysis, any policy that can influence these factors will result in greater collective progress and innovation for society (not to mention immense self-actualization of any particular individual).

Source: The Role of Luck in Life Success Is Far Greater Than We Realized – Scientific American Blog Network

China’s Mass Surveillance App Hacked; Code Reveals Specific Criteria For Illegal Oppression of specific minorities

Human Rights Watch got their hands on an app used by Chinese authorities in the western Xinjiang region to surveil, track and categorize the entire local population – particularly the 13 million or so Turkic Muslims subject to heightened scrutiny, of which around one million are thought to live in cultural ‘reeducation’ camps.

By “reverse engineering” the code in the “Integrated Joint Operations Platform” (IJOP) app, HRW was able to identify the exact criteria authorities rely on to ‘maintain social order.’ Of note, IJOP is “central to a larger ecosystem of social monitoring and control in the region,” and similar to systems being deployed throughout the entire country.

The platform targets 36 types of people for data collection, from those who have “collected money or materials for mosques with enthusiasm,” to people who stop using smartphones.

[A]uthorities are collecting massive amounts of personal information—from the color of a person’s car to their height down to the precise centimeter—and feeding it into the IJOP central system, linking that data to the person’s national identification card number. Our analysis also shows that Xinjiang authorities consider many forms of lawful, everyday, non-violent behavior—such as “not socializing with neighbors, often avoiding using the front door”—as suspicious. The app also labels the use of 51 network tools as suspicious, including many Virtual Private Networks (VPNs) and encrypted communication tools, such as WhatsApp and Viber. –Human Rights Watch

Another method of tracking is the “Four Associations”

The IJOP app suggests Xinjiang authorities track people’s personal relationships and consider broad categories of relationship problematic. One category of problematic relationships is called “Four Associations” (四关联), which the source code suggests refers to people who are “linked to the clues of cases” (关联案件线索), people “linked to those on the run” (关联在逃人员), people “linked to those abroad” (关联境外人员), and people “linked to those who are being especially watched” (关联关注人员). –HRW

*An extremely detailed look at the data collected and how the app works can be found in the actual report.

[…]

When IJOP detects a deviation from normal parameters, such as when a person uses a phone not registered to them, or when they use more electricity than what would be considered “normal,” or when they travel to an unauthorized area without police permission, the system flags them as “micro-clues” which authorities use to gauge the level of suspicion a citizen should fall under.

IJOP also monitors personal relationships – some of which are deemed inherently suspicious, such as relatives who have obtained new phone numbers or who maintain foreign links.

Chinese authorities justify the surveillance as a means to fight terrorism. To that end, IJOP checks for terrorist content and “violent audio-viusual content” when surveilling phones and software. It also flags “adherents of Wahhabism,” the ultra-conservative form of Islam accused of being a “source of global terrorism.

[…]

Meanwhile, under the broader “Strike Hard Campaign, authorities in Xinjiang are also collecting “biometrics, including DNA samples, fingerprints, iris scans, and blood types of all residents in the region ages 12 to 65,” according to the report, which adds that “the authorities require residents to give voice samples when they apply for passports.

The Strike Hard Campaign has shown complete disregard for the rights of Turkic Muslims to be presumed innocent until proven guilty. In Xinjiang, authorities have created a system that considers individuals suspicious based on broad and dubious criteria, and then generates lists of people to be evaluated by officials for detention. Official documents state that individuals “who ought to be taken, should be taken,” suggesting the goal is to maximize the number of people they find “untrustworthy” in detention. Such people are then subjected to police interrogation without basic procedural protections. They have no right to legal counsel, and some are subjected to torture and mistreatment, for which they have no effective redress, as we have documented in our September 2018 report. The result is Chinese authorities, bolstered by technology, arbitrarily and indefinitely detaining Turkic Muslims in Xinjiang en masse for actions and behavior that are not crimes under Chinese law.

Read the entire report from Human Rights Watch here.

Source: China’s Mass Surveillance App Hacked; Code Reveals Specific Criteria For Illegal Oppression | Zero Hedge

7 Trends You Must Know For a Successful Digital Marketing Campaign – loads of statistics infographic

These marketing statistics have been divided across seven key trends, both in the infographic below and in the list that follows it, helping you zero in on your primary marketing channel of interest. On the other hand, like most modern marketers, if your campaign strategy involves multiple channels, this division should help you update your notes more clearly.

Source: 7 Trends You Must Know For a Successful Digital Marketing Campaign – Serpwatch.io

Google gives Chrome 3rd party cookie control – which allows it to track you better, but rivals to not be able to do so

Google I/O Google, the largest handler of web cookies, plans to change the way its Chrome browser deals with the tokens, ostensibly to promote greater privacy, following similar steps taken by rival browser makers Apple, Brave, and Mozilla.

At Google I/O 2019 on Tuesday, Google’s web platform director Ben Galbraith announced the plan, which has begun to appear as a hidden opt-in feature in Chrome Canary – a version of Chrome for developer testing – and is expected to evolve over the coming months.

When a website creates a cookie on a visitor’s device for its own domain, it’s called a first-party cookie. Websites may also send responses to visitor page requests that refer to resources on a third-party domain, like a one-pixel tracking image hosted by an advertising site. By attempting to load that invisible image, the visitor enables the ad site to set a third-party cookie, if the user’s browser allows it.

Third-party cookies can have legitimate uses. They can help maintain states across sessions. For example, they can provide a way to view an embedded YouTube video (the third party in someone else’s website) without forcing a site visitor already logged into YouTube to navigate to YouTube, login and return.

But they can also be abused, which is why browser makers have implemented countermeasures. Apple uses WebKit’s Intelligent Tracking Protection for example to limit third-party cookies. Brave and Firefox block third party requests and cookies by default.

[…]

Augustine Fou, a cybersecurity and ad fraud researcher who advises companies about online marketing, told The Register that while Google’s cookie changes will benefit consumer privacy, they’ll be devastating for the rest of the ad tech business.

“It’s really great for Google’s own bottom line because all their users are logged in to various Google services anyway, and Google has consent/permission to advertise and personalize ads with the data,” he said.

In a phone interview with The Register, Johnny Ryan, chief policy and industry relations officer at browser maker Brave, expressed disbelief that Google makes it sound as if it’s opposed to tracking.

“Google isn’t just the biggest tracker, it’s the biggest workaround actor of tracking prevention yet,” he said, pointing to the company’s efforts to bypass tracking protection in Apple’s Safari browser.

In 2012, Google agreed to pay $22.5m to settle Federal Trade Commission charges that it “placed advertising tracking cookies on consumers’ computers, in many cases by circumventing the Safari browser’s default cookie-blocking setting.”

Ryan explained that last year Google implemented a forced login system that automatically allows Chrome into the user’s Google account whenever the user signs into a single Google application like Gmail.

“When the browser knows everything you’re doing, you don’t need to track anything else,” he said. “If you’re signed into Chrome, everything goes to Google.”

But other ad companies will know less, which will make them less competitive. “In real-time ad bidding, where Google’s DoubleClick is already by far the biggest player, Google will have a huge advantage because the Google cookie, the only cookie across websites, will have so much more valuable bid responses from advertisers.”

Source: Google puts Chrome on a cookie diet (which just so happens to starve its rivals, cough, cough…) • The Register