5034
This is why you're still seeing referendum ads online
summary: Google can't block ads placed via their own exchanges
advertising  adtech  google  ireland  ads  repealthe8th 
yesterday
ACLU to Amazon: Get out of the surveillance business
This is a fair point from the ACLU:
Already, Rekognition is in use in Florida and Oregon. Government agencies in California and Arizona have sought information about it, too. And Amazon didn't just sell Rekognition to law enforcement, it's actively partnering with them to ensure that authorities can fully utilize Rekognition's capabilities.

Amazon has branded itself as customer-centric, opposed secret government surveillance, and has a CEO who publicly supported First Amendment freedoms and spoke out against the discriminatory Muslim Ban. Yet, Amazon is powering dangerous surveillance that poses a grave threat to customers and communities already unjustly targeted in the current political climate.
We must make it clear to Amazon that we won't stand by and let it pad its bottom line by selling out our civil rights.
aclu  amazon  rekognition  facial-recognition  faces  law  privacy  data-privacy  civil-rights 
2 days ago
course-hero/slacktee
'a bash script that works like tee command. Instead of writing the standard input to files, slacktee posts it to Slack.'

(via Ardi)
via:ardi  shell  slack  ops  hacks  notification 
3 days ago
Louise Kenny's repeal facts and FAQs
Dr Louise Kenny, Professor of Obstetrics in UCC, with some extremely valid science
science  medicine  louise-kenny  repealthe8th  abortion 
3 days ago
Tricks, Lies and Videotape: The Dirty Tactics of the Anti Choice Side - HeadStuff
Hearing so, so many dirty tricks being pulled by the NO side. Please vote yes for repeal if you have a vote on Friday
repealthe8th  ireland  law  abortion  prochoice  dirty-tricks  tactics 
4 days ago
schibsted/strongbox: A secret manager for AWS
Strongbox is a CLI/GUI and SDK to manage, store, and retrieve secrets (access tokens, encryption keys, private certificates, etc). Strongbox is a client-side convenience layer on top of AWS KMS, DynamoDB and IAM. It manages the AWS resources for you and configure them in a secure way. Strongbox has been used in production since mid-2016 and is now used extensively within Schibsted.
schibsted  strongbox  kms  aws  dynamodb  storage  secrets  credentials  passwords  ops 
4 days ago
EC2 Instance Update – C5 Instances with Local NVMe Storage (C5d)
With a 25% to 50% improvement in price-performance over the C4 instances, the C5 instances are designed for applications like batch and log processing, distributed and or real-time analytics, high-performance computing (HPC), ad serving, highly scalable multiplayer gaming, and video encoding. Some of these applications can benefit from access to high-speed, ultra-low latency local storage. For example, video encoding, image manipulation, and other forms of media processing often necessitates large amounts of I/O to temporary storage. While the input and output files are valuable assets and are typically stored as Amazon Simple Storage Service (S3) objects, the intermediate files are expendable. Similarly, batch and log processing runs in a race-to-idle model, flushing volatile data to disk as fast as possible in order to make full use of compute resources.


Very nice!
ec2  instance-types  ops  storage  hardware  aws 
7 days ago
Bitcoin’s energy use got studied, and you libertarian nerds look even worse than usual | Grist
This is awful. What a waste:
Bitcoin’s energy footprint has more than doubled since Grist first wrote about it six months ago.

It’s expected to double again by the end of the year, according to a new peer-reviewed study out Wednesday. And if that happens, bitcoin would be gobbling up 0.5 percent of the world’s electricity, about as much as the Netherlands.

That’s a troubling trajectory, especially for a world that should be working overtime to root out energy waste and fight climate change. By late next year, bitcoin could be consuming more electricity than all the world’s solar panels currently produce — about 1.8 percent of global electricity, according to a simple extrapolation of the study’s predictions. That would effectively erase decades of progress on renewable energy.
energy  bitcoin  blockchain  cryptocurrencies  money  climate-change  planet  green 
8 days ago
Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site
LocationSmart, a U.S. based company that acts as an aggregator of real-time data about the precise location of mobile phone devices, has been leaking this information to anyone via a buggy component of its Web site — without the need for any password or other form of authentication or authorization — KrebsOnSecurity has learned. The company took the vulnerable service offline early this afternoon after being contacted by KrebsOnSecurity, which verified that it could be used to reveal the location of any AT&T, Sprint, T-Mobile or Verizon phone in the United States to an accuracy of within a few hundred yards.
locationsmart  verizon  sprint  t-mobile  att  brian-krebs  security  location-tracking  tracking  mobile  phones  location 
8 days ago
Docker is the dangerous gamble which we will regret : devops
The article this Reddit thread links to is garbage clickbait, but the responses are insightful and much better
reddit  ops  containerization  docker  contrarians  rkt 
8 days ago
Completely Silent Computer
This computer makes no noise when it starts up.  It makes no noise when it shuts down.  It makes no noise when it idles.  It makes no noise when it’s under heavy load.  It makes no noise when it’s reading or writing data.  It can’t be heard in a regular room during the day.  It can’t be heard in a completely quiet house in the middle of the night.  It can’t be heard from 1m away.  It can’t be heard from 1cm away.  It can’t be heard — period.  It’s taken nearly 30 years to reach this point, but I’ve finally arrived.  The journey is over and it feels great.

If you are after a silent — not just quiet, but silent — daily driver, then I strongly recommend a passively-cooled case, heat pipes and solid state drives.  Eliminate the moving parts (e.g. fans, HDDs) and you eliminate the noise — it’s not that complicated.  It also doesn’t need to be really expensive (my system requirements were not ‘average’ so please don’t infer from this post that all DB4-based systems are as expensive).  Silence (and a perfectly respectable computer) can easily be had for half the price.
diy  hardware  pc  silence  quiet-hardware  cooling  fanless  amd 
8 days ago
Canaries As Poisonous Gas Detectors
n the late 1890s, [John] Haldane began experimenting on small animals like white mice and canaries [to detect carbon monoxide]. Small animals have faster metabolism rate, and hence show the effects of carbon monoxide poisoning much earlier even in the presence of small quantities of the noxious gas. Canaries are especially good at detecting toxins in the air because of their specialized respiratory system.
carbon-monoxide  gas  safety  canaries  coal  mining  mines  respiration  gas-detectors 
8 days ago
Crank magnetism
Crank magnetism also denotes the tendency — even for otherwise "lone issue" cranks — to accumulate more crank beliefs over time. You know that old saying about not being so open-minded that your brain falls out? People with crank magnetism didn't pay attention to that. Crank magnetism is an important stepping stone on the path towards being wrong all of the time. Its opposite is the stopped clock (which is when otherwise overly credulous people actually find some crankery that they won't believe in, and may even actively denounce it).
cranks  psychoceramics  crazy  crank-magnetism  antivaxxers  climate-change-denial 
9 days ago
Face recognition police tools 'staggeringly inaccurate' - BBC News
"In figures given to Big Brother Watch, South Wales Police said its facial recognition technology had made 2,685 "matches" between May 2017 and March 2018 - but 2,451 were false alarms."

This is going to be a disaster.
surveillance  bbc  wales  facial-recognition  privacy  false-positives  ml 
9 days ago
Dickens invented "gammon" as a slur in 1838, in 'Nicholas Nickleby'
This is thoroughly brexiteering stuff:

The time had been, when this burst of enthusiasm would have been cheered to the very echo; but now, the deputation received it with chilling coldness. The general impression seemed to be, that as an explanation of Mr Gregsbury’s political conduct, it did not enter quite enough into detail; and one gentleman in the rear did not scruple to remark aloud, that, for his purpose, it savoured rather too much of a ‘gammon’ tendency.

‘The meaning of that term — gammon,’ said Mr Gregsbury, ‘is unknown to me. If it means that I grow a little too fervid, or perhaps even hyperbolical, in extolling my native land, I admit the full justice of the remark. I AM proud of this free and happy country. My form dilates, my eye glistens, my breast heaves, my heart swells, my bosom burns, when I call to mind her greatness and her glory.’
brexit  funny  gammon  charles-dickens  history  gb  politics  uk-politics  uk 
10 days ago
Abortion - the street demonstrations in pictures
There's me, marching after the X Case in 1992; bookmarking for posterity and my own scrapbook! Repeal the 8th!

'1992: A demonstration against the High Court injunction forbidding a 14-year-old alleged rape victim from obtaining an abortion in Britain. Photograph: The Irish Times'
1992  1990s  history  ireland  x-case  abortion  repealthe8th  law 
10 days ago
"Mudslinging" campaigns drive down voting rates, particularly among the unsure
Does negative campaigning influence the likelihood of voting in elections? Our study of U.S. Senate campaigns indicates the answer is “yes.” We find that people distinguish between useful negative information presented in an appropriate manner and irrelevant and harsh mudslinging. As the proportion of legitimate criticisms increases in campaigns, citizens become more likely to cast ballots. When campaigns degenerate into unsubstantiated and shrill attacks, voters tend to stay home. Finally, we find that individuals vary in their sensitivity to the tenor of campaigns. In particular, the tone is more consequential for independents, for those with less interest in politics, and for those with less knowledge about politics.


(via Mark Dennehy)
politics  strategy  ireland  referenda  via:markdennehy  dirty-tricks 
10 days ago
Attacks against GPG signed APT repositories - Packagecloud Blog

It is a common misconception that simply signing your packages and repository metadata with GPG is enough to create a secure APT repository. This is false. Many of the attacks outlined in the paper and this blog post are effective against GPG-signed APT repositories. GPG signing Debian packages themselves does nothing, as explained below. The easiest way to prevent the attacks covered below is to always serve your APT repository over TLS; no exceptions.


This is excellent research. My faith in GPG sigs on packages is well shaken.
apt  security  debian  packaging  gpg  pgp  packages  dpkg  apt-get  ops 
10 days ago
GDPR will pop the adtech bubble
Without adtech, the EU’s GDPR (General Data Protection Regulation) would never have happened. But the GDPR did happen, and as a result websites all over the world are suddenly posting notices about their changed privacy policies, use of cookies, and opt-in choices for “relevant” or “interest-based” (translation: tracking-based) advertising. Email lists are doing the same kinds of things.

“Sunrise day” for the GDPR is 25 May. That’s when the EU can start smacking fines on violators.

Simply put, your site or service is a violator if it extracts or processes personal data without personal permission. Real permission, that is. You know, where you specifically say “Hell yeah, I wanna be tracked everywhere.”

Of course what I just said greatly simplifies what the GDPR actually utters, in bureaucratic legalese. The GDPR is also full of loopholes only snakes can thread; but the spirit of the law is clear, and the snakes will be easy to shame, even if they don’t get fined. (And legitimate interest—an actual loophole in the GDPR, may prove hard to claim.)

Toward the aftermath, the main question is What will be left of advertising—and what it supports—after the adtech bubble pops?
advertising  europe  law  privacy  gdpr  tracking  data-privacy 
10 days ago
The Tidelift Subscription
The core idea of the Tidelift Subscription is to pay for “promises about the future” of your software components.  

When you incorporate an open source library into your application, you need to know not just that you can use it as-is today, but that it will be kept secure, properly licensed, and well maintained in the future. The Tidelift Subscription creates a direct financial incentive for the individual maintainers of the software stacks you use to follow through on those commitments. Aligning everyone’s interests—professional development teams and maintainers alike.

Critically, the Tidelift Subscriptions for React, Angular, and Vue.js cover not just the core libraries, but the vast set of dependencies and libraries typically used in these stacks. For example, a basic React web application pulls in over 1,000 distinct npm packages as dependencies. The Tidelift Subscription covers that full depth of packages which originate from all parts of the open source community, beyond the handful of core packages published by the React engineering team itself.
tidelift  open-source  libraries  dependencies  coding 
17 days ago
Fraandship
Manish is definitely aware of how he and his other fraandship-seekers are perceived by Western women. But he says, “It’s a difficult problem to solve because men speaking to women they aren’t married to — or who aren’t in their families — isn’t usually allowed.” In fact, he later tells me that he’s spoken to very few women in his life, and that the internet has finally allowed him and others like him to speak to women without being worried about their parents or family finding out.

It’s this inexperience with women that leaves them defaulting to what they know best: “What we see in movies, [especially] Western movies.”

“We think if we talk about sex, or we try to act like people we see in films, we will be like them,” Manish explains. “So then, we get [upset] and confused when we’re blocked, or when these girls don’t talk back to us.”

Still, Manish and his friends are undeterred. Blocked or not, rejected or not, they continue to spend hours on other people’s Facebook and Twitter profiles, imagining what their lives are like — and how those lives could be theirs one day. “I will still go to America, or maybe London!” he says as we finish up our Skype call. “Soon, I will go. I do not want to stay here. I want to see the world. By [talking] to you, I’m already doing that.”
fraandship  fraands  south-asia  india  pakistan  internet  chat  dms 
20 days ago
One space between each sentence, they said. Science just proved them wrong. - The Washington Post
Reading speed only improved marginally, the paper found, and only for the 21 “two-spacers,” who naturally typed with two spaces between sentences.  The majority of one-spacers, on the other hand, read at pretty much the same speed either way.  And reading comprehension was unaffected for everyone, regardless of how many spaces followed a period.
The major reason to use two spaces, the researchers wrote, was to make the reading process smoother, not faster.  Everyone tended to spend fewer milliseconds staring at periods when a little extra blank space followed it.


Yes yes yes. But two spaces is better!
two-spaces  spaces  typing  reading 
20 days ago
DNA databases: biology stripped bare
Unlike other biometrics, [DNA] also provides revealing [data regarding] thousands of other related individuals; even to an entire ethnic group.

Such markers may reveal a genetic predisposition towards cancer, or early onset dementia. Mining that data and linking it to family trees and thus, individuals, might interest insurance companies, or state health bodies, or – as ever – advertisers. Or? Who knows?

And the ability of a third-party potentially to reveal such information about me, about you, without us having any say, by providing their DNA profile for some personal purpose? Consider how furious so many have been on the basis of their Facebook profile data going to Cambridge Analytica via some Facebook friend deciding to do a quiz.

Facebook profile data is revealing enough. But DNA is you, fully, irrevocably, exposed. And whatever it displays about you right now, is trivial compared to what we will be able to read into it in the future.

That’s why this case isn’t just about a solitary law enforcement outcome, but about all of us doing an unintended, genetic full monty.
dna-matching  dna  data-privacy  privacy  future  health  cancer  insurance  karlin-lillington 
22 days ago
I Am the One Woman Who Has It All | The New Yorker

I have two kids and the unspoken pressure to act like they don’t exist when I’m on a conference call.

I have no problem lying about “being in a meeting” when I’m with my kids and no problem lying to my kids about “needing to work” when I’m on Facebook.
parenting  funny  new-yorker  women  life  work  work-life-balance  kids 
23 days ago
Twitter thread: "People still talk about charging speed like it's a long-term obstacle for electric cars. It's not, for several reasons"
great thread on EV futures. Range anxiety is rapidly dwindling and they are the way of the future for sure
evs  cars  driving  batteries  bevs 
23 days ago
An Algorithmic Investigation of the Highfalutin 'Poet Voice' - Atlas Obscura
'It’s easy to make fun of Poet Voice. But its proliferation across the space of academic poetry may have more serious implications as well. In a 2014 essay, “Poet Voice and Flock Mentality,” the poet Lisa Marie Basile connects it to an overall lack of diversity in the field, and a fear of breaking the mold. The consistent use of it, she writes, “delivers two messages: I am educated, I am taught, I am part-of a group … I am afraid to tell my own story in my own voice.”'
poet-voice  talking  speech  voices  intonation  droning  poetry 
23 days ago
I tried leaving Facebook. I couldn’t - The Verge
Facebook events, Facebook pages, Facebook photos, and Facebook videos are for many people an integral part of the church picnic, the Christmas party, the class reunion, the baby shower. (The growing scourge of gender reveal parties with their elaborate “reveal” rituals and custom-made cakes seems particularly designed to complement documentation on social media). The completeness of Facebook allows people to create better substitutes for in-person support groups in a wide range of ever-narrowing demographics — from casual interests like Instant Pot recipes for Korean food to heavy life-altering circumstances like rare forms of cancer.

Of all people, I know why I shouldn’t trust Facebook, why my presence on its network contributes to the collective problem of its monopolistic hold on people. Everyone is on Facebook because everyone is on Facebook. And because everyone is on Facebook, even the people who aren’t are having their data collected in shadow profiles. My inaction affects even the people who have managed to stay away. I know this, I barely use Facebook, I don’t even like Facebook, and I find it nearly impossible to leave.
privacy  facebook  deletefacebook  social-networking  social  life  social-media  data-privacy 
24 days ago
Silicon Valley Can't Be Trusted With Our History
the internet is messing with human cognition in ways that will take decades to fully understand. Some researchers believe it is altering the way we create memories. In one study, researchers told a group of people to copy a list of facts onto a computer. They told half the group that the facts would be saved when they finished and the other half that the facts would be erased. Those who thought that the facts would be saved were much worse at remembering them afterward. Instead of relying on our friends and neighbors — or on books, for that matter — we have started outsourcing our memories to the internet.

So what happens if those memories are erased — and if the very platforms responsible for their storage are the ones doing the erasing? That scenario is a threat everywhere, but particularly in countries where the authorities are most aggressively controlling speech and editing history. We say the internet never forgets, but internet freedom isn’t evenly distributed: When tech companies have expanded into parts of the world where information suppression is the norm, they have proven willing to work with local censors.
Those censors will be emboldened by new efforts at platform regulation in the US and Europe, just as authoritarian regimes have already enthusiastically repurposed the rhetoric of “fake news.”

The reach and power of tech platforms such as Facebook and Twitter are so new and strange that we’ve barely begun formulating a response. But we can learn from the activists already doing it; from Mosireen, or the team behind the Syrian Archive — six people, with a budget of $96,000, who are preserving thousands of hours of footage from their country’s civil war. The archive recently published the Chemical Weapons Database, documenting 221 chemical weapons attacks with 861 verified videos, implicating the Assad regime in a pattern of war crimes and putting the lie to armchair investigators helping to propagate conspiracy theories in the West. One of its cofounders recently told the Intercept that he spends nearly all his time making sure videos aren’t deleted from the big tech platforms before he gets a chance to download them.
censorship  syria  chemical-weapons  assad  history  youtube  video  archival  mosireen  the-syrian-archive  archives  memory  facebook 
24 days ago
The brave new world of genetic genealogy - MIT Technology Review
The combination of DNA and genealogy is a potentially a huge force for good in the world, but it must be used responsibly. In all cases where public databases like GEDmatch are used, the potential for good must be balanced against the potential for harm. In cases involving adoptee searches, missing persons, and unidentified bodies, the potential for good usually markedly outweighs the potential for harm.

But the situation is not so clear-cut when it comes to the use of the methodology to identify suspects in rape and murder cases. The potential for harm is much higher under these circumstances, because of the risk of misuse, misapplication or misinterpretation of the data leading to wrongful identification of suspects. The stakes are too high for the GEDmatch database to be used by the police without oversight by a court of law. 

However, we are not looking at a dystopian future. In the long run the public sharing of DNA data, when done responsibly, is likely to have huge benefits for society. If a criminal can be caught not by his own DNA but through a match with one of his cousins he will be less likely to commit a crime in the first place. With the move to whole genome sequencing in forensic cases in the future, it will be possible to make better use of genetic genealogy methods and databases to identify missing people, the remains of soldiers from World War One and World War Two as well as more recent wars, and casualties from natural and manmade disasters. We will be able to give many more unidentified people the dignity of their identity in death. But we each control our own DNA and we should all be able to decide what, if anything, we wish to share.
gedmatch  genealogy  dna  police  murder  rape  dna-matching  privacy  data-privacy 
25 days ago
Warning signs for TSB's IT meltdown were clear a year ago – insider | Business | The Guardian
The team behind the development were celebrating. In a LinkedIn post since removed, those involved in the migration were describing themselves as “champions”, a “hell of a team” and were pictured raising glasses of bubbly to cheers of “TSB transfer done and dusted”. However, only hours after the switch was flicked, systems crumpled and up to 1.9m TSB customers who use internet and mobile banking were locked out. “I could have put money on the rollout being the disaster it has been, with evidence of major code changes on the hoof over last weekend and into this week,” the insider said.

Customers reported receiving texts saying their cards had been used abroad, that they had discovered thousands of pounds in their accounts they did not have – or that mortgage accounts had vanished, multiplied or changed currency. One bemused account holder showed his TSB banking app recording a direct debit paid to Sky Digital 81 years from now. Some saw details of other people’s accounts and holidaymakers complained that they had been left unable to pay restaurant and hotel bills.


What an incredible shitfest.
banks  tsb  fail  banking  uk  sabadell 
25 days ago
Europe fires back at ICANN's delusional plan to overhaul Whois for GDPR by next, er, year • The Register
So was it European law experts Hamilton that wrongly advised ICANN that it could request for a "moratorium" over the new law until it came up with a new solution?

It seems unlikely given their expertise and the fact it was them that first warned ICANN that it had wrongly persuaded itself that it was not affected by the new law. What seems more probable is that ICANN's staff and management board simply persuaded themselves that they could stall for time for no reason other than the fact that it would be convenient for them.
icann  fail  gdpr  whois  law  regulation  eu 
25 days ago
repealfacts and FAQs.pdf
Louise Kenny, Consultant Obstetrician and Professor of Maternal and Fetal Health, systematically demolishes anti-choice propaganda points with solid scientific facts
repeal  repealthe8th  science  biology  medicine  pregnancy  abortion  pro-choice  ireland  miscarriage 
26 days ago
The Handmaid’s Tale doesn’t quite get modern American misogyny - The Verge
Soft biological determinism doesn’t inevitably lead to harsh oppression, but that’s not the point. In The Handmaid’s Tale, Margaret Atwood imagined how seeds of xenophobia, misogyny, and authoritarianism could utterly corrupt a popular ideology with many well-meaning supporters — because a Gilead can grow in any group that lets its principles take root. That includes Evangelical Christianity, but also a modern secular rationalism that’s being co-opted by white male supremacists, speaking the language of science and logic.
It’s not hard to envision a world that’s as cruel to women as Gilead, which is why watching The Handmaid’s Tale is so exhausting. But despite all its brutality, the show softens a more painful truth: misogyny doesn’t just persist, it evolves.
handmaids-tale  margaret-atwood  science-fiction  sf  misogyny  incels  4chan 
29 days ago
keiichishima/yacryptopan
'Yet another Crypto-PAn implementation for Python':
This package provides a function to anonymize IP addresses keeping their prefix consistency. This program is based on the paper "Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme" written by Jun Xu, Jinliang Fan, Mostafa H. Ammar, and Sue B. Moon. The detailed explanation can be found in [Xu2002]. This package supports both IPv4 and IPv6 anonymization.


(via Alexandre Dulaunoy)
via:adulau  anonymization  ip-addresses  internet  ipv4  ipv6  security  crypto  python  crypto-pan 
29 days ago
The Joy Reid fight reinforces how critical the Internet Archive is to modern politics - The Washington Post
What the Wayback Machine provides, in essence, is a third-party archiving service that largely escapes the influence of the content creators. If you publish a blog on a blogging platform (or a tweet on Twitter, etc.), you still have the power to go in and remove or alter what you’ve written. The Wayback Machine makes it much more difficult to cover your tracks, should you wish to. As more people who grew up creating content for the Web enter positions of authority in media and politics, that archive becomes more important.

If the Wayback Machine hadn’t indexed Reid’s site, her words might have been lost. Or if someone had stumbled onto her old blog post, her expert’s argument that the post was fraudulent in some way might carry more weight. But with that index timestamped more than a decade ago, the argument is substantially undercut.

Reid’s blog, though, is not currently available on the Wayback Machine. Her old blog updated the file on its server telling automated systems what can and can’t be indexed, a set of instructions that the Wayback Machine’s system respects as it gathers information from around the Web. By changing that file, Reid’s team essentially pulled a curtain down on her past writing.
internet-archive  archival  history  joy-reid  web  blogging  wayback-machine  robots.txt 
29 days ago
TheJournal.ie FactCheck is first Irish outlet to officially tackle misinformation on Facebook
TheJournal.ie FactCheck project has signed on to carry out third-party fact-checking on Facebook. This will involved testing the veracity of articles posted on the platform and attaching a rating and contextual information to contested items.


Awesome. nice one TJ
the-journal  fact-checking  facebook  fake-news  facts  journalism 
29 days ago
twitter thread on incel culture, the "manosphere" and the rest of that toxic garbage
For the past little while, I've been working on a piece about Toronto's relationship to the alt-right, especially the "manosphere." Unfortunately that research has become relevant. I'm going to share as much as I can here for people who may not be familiar with these movements.
incels  manosphere  4chan  hate  internet  pua  kill-all-normies 
29 days ago
The Australian Bureau of Statistics Tracked People By Their Mobile Device Data.
The ABS claims population estimates have a “major data gap” and so they’ve been a busy bee figuring out a way to track crowd movement. Their solution? Mobile device user data. “…with its near-complete coverage of the population, mobile device data is now seen as a feasible way to estimate temporary populations,” states a 2017 conference extract for a talk by ABS Demographer Andrew Howe.

While the “Estimated Resident Population” (ERP) is Australia’s official population measure, the ABS felt the pre-existing data wasn’t ‘granular’ enough. What the ABS really wanted to know was where you’re moving, hour by hour, through the CBD, educational hubs, tourist areas. Howe’s ABS pilot study of mobile device user data creates population estimates with the help of a trial engagement with an unnamed telco company. The data includes age and sex breakdowns. The study ran between the 18th April to 1st May 2016. [....]

Electronic Frontiers Australia board member Justin Warren also pointed out that while there are beneficial uses for this kind of information, “…the ABS should be treading much more carefully than it is. The ABS damaged its reputation with its bungled management of the 2016 Census, and with its failure to properly consult with civil society about its decision to retain names and addresses. Now we discover that the ABS is running secret tracking experiments on the population?”

“Even if the ABS’ motives are benign, this behaviour — making ethically dubious decisions without consulting the public it is experimenting on — continues to damage the once stellar reputation of the ABS.”

“This kind of population tracking has a dark history. During World War II, the US Census Bureau used this kind of tracking information to round up Japanese-Americans for internment. Census data was used extensively by Nazi Germany to target specific groups of people. The ABS should be acutely aware of these historical abuses, and the current tensions within society that mirror those earlier, dark days all too closely.”
abs  australia  tracking  location-data  privacy  data-privacy  mobile 
4 weeks ago
Parallelizing S3 Workloads with s5cmd
nice parallel download/upload tool for S3, developed by Peak Games, open source, in Go
golang  go  s5cmd  open-source  tools  cli  s3  aws 
4 weeks ago
Debugging Stuck Ruby Processes — What to do Before You Kill -9
good tips on using gdb to gather backtraces (via Louise)
debugging  gdb  ruby  linux  unix  threads  ops 
4 weeks ago
Use the GDPR to find who has advertised to you on Facebook, and get them to delete your details
Sometimes you get ads on Facebook and you are just not interested in what they’re selling. This is a way to find out who has uploaded your email address into facebook to target ads at you, and then- if you’re in the EU- how to use the new General Data Protection Regulation to get those advertisers to delete you from their system.


Totally going to do this. roll on May 25
gdpr  facebook  privacy  ads  data-privacy  eu 
4 weeks ago
Palantir Knows Everything About You
This is so fucking dystopian:
Operation Laser has made L.A. cops more surgical — and, according to community activists, unrelenting. Once targets are enmeshed in a [Palantir] spidergram, they’re stuck.

Manuel Rios, 22, lives in the back of his grandmother’s house at the top of a hill in East L.A., in the heart of the city’s gang area. [...] He grew up surrounded by friends who joined Eastside 18, the local affiliate of the 18th Street gang, one of the largest criminal syndicates in Southern California. Rios says he was never “jumped in”—initiated into 18. He spent years addicted to crystal meth and was once arrested for possession of a handgun and sentenced to probation. But except for a stint in county jail for a burglary arrest inside a city rec center, he’s avoided further trouble and says he kicked his meth habit last year.

In 2016, Rios was sitting in a parked car with an Eastside 18 friend when a police car pulled up. His buddy ran, pursued by the cops, but Rios stayed put. “Why should I run? I’m not a gang member,” he says over steak and eggs at the IHOP near his home. The police returned and handcuffed him. One of them took his picture with a cellphone. “Welcome to the gang database!” the officer said.

Since then he’s been stopped more than a dozen times, he says, and told that if he doesn’t like it he should move. He has nowhere to go. His girlfriend just had a baby girl, and he wants to be around for them. “They say you’re in the system, you can’t lie to us,” he says. “I tell them, ‘How can I be in the hood if I haven’t got jumped in? Can’t you guys tell people who bang and who don’t?’ They go by their facts, not the real facts.”

The police, on autopilot with Palantir, are driving Rios toward his gang friends, not away from them, worries Mariella Saba, a neighbor and community organizer who helped him get off meth. When whole communities like East L.A. are algorithmically scraped for pre-crime suspects, data is destiny, says Saba. “These are systemic processes. When people are constantly harassed in a gang context, it pushes them to join. They internalize being told they’re bad.”
palantir  surveillance  privacy  precrime  spidergrams  future  la  gangs  justice  algorithms  data-protection  data-privacy  policing  harrassment 
5 weeks ago
_Building a Bw-Tree Takes More Than Just Buzz Words_, SIGMOD 2018
'An account of our disappointing journey to build a open-source lock-free Bw-Tree for the Peloton DBMS.'

'In 2013, Microsoft Research proposed the Bw-Tree (humorously
termed the “Buzz Word Tree”), a lock-free index that provides high
throughput for transactional database workloads in SQL Server’s
Hekaton engine. The Bw-Tree avoids locks by appending delta
record to tree nodes and using an indirection layer that allows it to
atomically update physical pointers using compare-and-swap (CaS).
Correctly implementing this techniques requires careful attention
to detail. Unfortunately, the Bw-Tree papers from Microsoft are
missing important details and the source code has not been released.

This paper has two contributions: First, it is the missing guide
for how to build a lock-free Bw-Tree. We clarify missing points in
Microsoft’s original design documents and then present techniques
to improve the index’s performance. Although our focus here is on
the Bw-Tree, many of our methods apply more broadly to designing
and implementing future lock-free in-memory data structures. Our
experimental evaluation shows that our optimized variant achieves
1.1–2.5× better performance than the original Microsoft proposal
for highly concurrent workloads. Second, our evaluation shows
that despite our improvements, the Bw-Tree still does not perform
as well as other concurrent data structures that use locks.'

Finally: https://twitter.com/andy_pavlo/status/986647389820747776 :

'Our results show that @ViktorLeis's ART index and @xexd's MassTree and a non-fancy B+Tree are currently the best for in-memory workloads. Skip Lists are always terrible.'
skip-lists  algorithms  data-structures  storage  bw-trees  mass-trees  benchmarks  performance  multithreading  lock-free  locking  trees 
5 weeks ago
A flaw-by-flaw guide to Facebook’s new GDPR privacy changes | TechCrunch
Overall, it seems like Facebook is complying with the letter of GDPR law, but with questionable spirit. Sure, privacy is boring to a lot of people. Too little info and they feel confused and scared. Too many choices and screens and they feel overwhelmed and annoyed. Facebook struck the right balance in some places here. But the subtly pushy designs seem intended to steer people away from changing their defaults in ways that could hamper Facebook’s mission and business.
gdpr  design  facebook  privacy  data-protection  data-privacy  social-networking  eu  law 
5 weeks ago
Securing wireless neurostimulators
The latest generation of such devices come with remote monitoring and reprogramming capabilities, via an external device programmer. The manufacturers seem to have relied on security through obscurity (when will we ever learn!) with the very predictable result that the interface turns out not be secure at all. So we end up with a hackable device connected directly to someone’s brain.
security  brain  health  medical  devices  iot  exploits  neurostimulators 
5 weeks ago
"Facebook will implement a part of their transparency plan"
The Transparent Referendum Initiative writes:
Big News - Facebook will implement a part of their transparency plan - the ability to see the ads that a page has paid for- IN IRELAND FROM 25th. A positive first step. This will help us build out our database, as we wait for a platform fed offline list to be implemented. #8thRef
facebook  ads  transparency  ireland  repealthe8th  referenda  voting 
5 weeks ago
Scientists accidentally create mutant enzyme that eats plastic bottles
Scientists have created a mutant enzyme that breaks down plastic drinks bottles – by accident. The breakthrough could help solve the global plastic pollution crisis by enabling for the first time the full recycling of bottles.

The new research was spurred by the discovery in 2016 of the first bacterium that had naturally evolved to eat plastic, at a waste dump in Japan. Scientists have now revealed the detailed structure of the crucial enzyme produced by the bug. The international team then tweaked the enzyme to see how it had evolved, but tests showed they had inadvertently made the molecule even better at breaking down the PET (polyethylene terephthalate) plastic used for soft drink bottles. “What actually turned out was we improved the enzyme, which was a bit of a shock,” said Prof John McGeehan, at the University of Portsmouth, UK, who led the research. “It’s great and a real finding.”
plastic  recycling  enzymes  science  mutants  pet  bottles  green 
5 weeks ago
"Tweeps! What’s the craziest infra incident you worked on at Twitter"
great thread of Twitter outages and production incidents. I would love to hear more details about these, I love hearing about other people's outages ;) Even reading "over a month of cleanup and some permanent data loss" has me sweating....
infrastructure  engineering  twitter  ops  outages  production 
5 weeks ago
Best Practices for DynamoDB
Amazon have updated this architectural tips doc for DynamoDB users -- good reference
dynamodb  nosql  aws  storage  databases  design  coding 
5 weeks ago
Thomas Mayne (politician) - Wikipedia
An illustrious ancestor, apparently!

'Thomas Mayne (1832–1915) was an Irish Parliamentary Party politician. He was elected as Member of Parliament (MP) for Tipperary at a by-election in 1883,[1] and held the seat until the constituency was divided at the 1885 general election. He was then elected for the new Mid division of Tipperary,[2] and held that seat until he resigned in 1890 by becoming Steward of the Manor of Northstead.[3]'

He was known for helping Charles Stewart Parnell in a sticky situation -- from http://www.online-literature.com/elbert-hubbard/journeys-vol-thirteen/6/ :

'About six months after this, London was convulsed with laughter at a joke too good to keep: One Captain O'Shea [Kitty O'Shea's husband] had challenged Charles Parnell, the Irish Leader, to a duel. Parnell accepted the challenge, but the fight was off, because Thomas Mayne had gone to O'Shea and told him he "would kick him the length of Rotten Row if he tried to harm or even opened his Galway yawp about Parnell."'
parnell  thomas-mayne  ancestors  history  ireland  nationalism  mps  1800s  19th-century  kitty-oshea 
5 weeks ago
How to report graphic abortion imagery to the gardai under Irish law
I tried to report ICBR graphic abortion imagery to the Gardai today and met a lot of resistance. The following thread gives an account of what happened and how someone can effectively report this imagery. 1/x
At 2pm on Friday the 13th of April I noticed the presence of ICBR graphic abortion imagery being displayed outside the Nassau street entrance of Trinity. I called Kevin Street Garda Station in order to make a complaint under Section 7 of the Public Order Act 1994 2/x
I was told that the Gardai had been instructed by their superiors to not intervene with such imagery and that this direction had come from the Refendum Commission itself. I then called the Refendum Commission in order to query this, as they'd never been involved previously. 3/x
A representative from the commission informed me that no such direction had been given to the Gardai as it is not in the commission's remit to influence such imagery. The representative told me that they would contact with Kevin Street Station about this miscommunication. 4/x
I then rang Kevin Street Station again to inform them of what I had been told by the Refendum Commission. I was then told that a complaint had to be made in person to either a Garda on the scene or to a local station (Trinity would be Pearse Street), which is understandable. 5/x
I informed the Gardai of a similar experience in Dundrum in which the local station had dispatched officers to move along those displaying the imagery to prevent a breach of the peace without a complaint being made in person. 6/x
I was finally told that Pearse Street Station would be contacted to have an available car dispatched to Trinity. 8/x
TLDR: If you see this imagery, report it under Section 7. If you are told that the Gardai cannot intervene, let them know that other stations have before. If they say they have been directed by the Referendum Commission, let them know there is no such directive on record. 9/x
I hope this miscommunication can be cleared up and that both @gardainfo and @RefCom_ie end up on the same page, so that Gardai can continue to do their jobs effectively and respond to public complaints of breach of the peace. 10/10


Very illuminating.
twitter  threads  abortion  propaganda  gardai  law  ireland  public-order-act 
5 weeks ago
How to talk to your children about abortion care in the run-up to the referendum
She pointed out one of the “baby” posters the other day when we were in the car and passed one. I said “Actually that’s a baby seed but the people who paid a lot of money for those posters made it look like a baby on purpose, because they think everyone who has a baby seed should have to grow it into a baby whether they wanted to or not. And that I think that’s telling lies and shouldn’t be allowed."
abortion  pro-choice  kids  children  education  childbirth  savita  propaganda  repealthe8th  parenting 
6 weeks ago
A Taxonomy of Tech Debt | Riot Games Engineering
Very sensible way to group/classify tech debt work -- we did something similar in Swrve internally at one point, but this is much more evolved
engineering  software  coding 
6 weeks ago
#Repealthe8th | Are the Irish Media Up To The Job?
For years we were subject to speculation and debate about the emergence of new party in Irish politics. Endless coverage for Lucinda Creighton, Michael McDowell and whoever else. All the while, the most incredibly vibrant social movement touching every county in Ireland has emerged and the majority of journalists are unable to write about it.

Media comment has concerned itself not so much with the issues but with grave concern that this is happening outside perceived boundaries of respectable politics. This is ordinary people getting together and putting a most unspeakable issue on the agenda and soon to vote – in spite of the Normal Rules.

It is not just that regime journalists live in a bubble or don’t care to inform themselves. They genuinely do not understand how this campaign has played out. It is beyond their entire conception. This is what happens when your idea of politics only extends to the ritual of posters on lamp posts.
media  ireland  politics  political-correspondents  oireachtas-retort  analysis  society  marref  repealthe8th 
6 weeks ago
Uses This / Leonard Lin
lhl describes the stuff he uses, day to day. Lots of travel gear, drones, Linux and a surprising lack of Macs
travel  shopping  hardware  gear  uses-this  lhl  drones  vr  linux  vive  chromebook  tips 
6 weeks ago
The American Chopper meme, explained - Vox
"Maybe we should have been blogging in dialectics all along"
memes  american-chopper  dialectics  academia  discussion  plato  dialogue 
6 weeks ago
Gravis McElroy on Twitter: "The thing that really kills me about the silicon valley hypercapitalist hell spiral...."
Epic shouty thread about modern Silicon Valley software products.
We know that no company, regardless of size, can be trusted with this information. We KNOW it will not stay private, our photos of our partners genitals and tax documents will become public either deliberately or accidentally.

We know that any company that tries to buck this trend can't be trusted, and even if they are completely, absolutely transparent, it doesn't matter because we will wake up one day to discover they were purchased at 2 AM and the data transfer /already started/

We represent billions in revenue but they hold our info in escrow and that means we don't have enough money to buy their loyalty, because a business considers business money more real than person money.
money  funding  capitalism  silicon-valley  internet  web  google  facebook  banks  banking 
6 weeks ago
Mythology about security…
A valuable history lesson from Jim Gettys:
Government export controls crippled Internet security and the design of Internet protocols from the very beginning: we continue to pay the price to this day.  Getting security right is really, really hard, and current efforts towards “back doors”, or other access is misguided. We haven’t even recovered from the previous rounds of government regulations, which has caused excessive complexity in an already difficult problem and many serious security problems. Let us not repeat this mistake…


I remember the complexity of navigating crypto export controls. As noted here, it was generally easier just not to incorporate security features.
security  crypto  export-control  jim-gettys  x11  history  x-windows  mit  athena  kerberos 
6 weeks ago
Austerity is an Algorithm
Fucking hell, things sound grim Down Under:
Things changed in December 2016, when the government announced that the system had undergone full automation. Humans would no longer investigate anomalies in earnings. Instead, debt notices would be automatically generated when inconsistencies were detected. The government’s rationale for automating the process was telling. “Our aim is to ensure that people get what they are entitled to—no more and no less,” read the press release. “And to crack down hard when people deliberately defraud the system.”

The result was a disaster. I’ve had friends who’ve received an innocuous email urging them to check their MyGov account—an online portal available to Australian citizens with an internet connection to access a variety of government services—only to log in and find they’re hundreds or thousands of dollars in arrears, supposedly because they didn’t accurately report their income. Some received threats from private debt collectors, who told them their wages would be seized if they didn’t submit to a payment plan.

Those who wanted to contest their debts had to lodge a formal complaint, and were subjected to hours of Mozart’s Divertimento in F Major before they could talk to a case worker. Others tried taking their concerns directly to the Centrelink agency on Twitter, where they were directed to calling Lifeline, a 24-hour hotline for crisis support and suicide prevention.

At the end of 2015, my friend Chloe received a notice claiming she owed $20,000 to the government. She was told that she had reported her income incorrectly while on Youth Allowance, which provides financial assistance to certain categories of young people.

The figure was shocking and, like others in her position, she grew suspicious. She decided to contest the debt: she contacted all of her previous employers so she could gather pay slips, and scanned them into the MyGov app. “I gave them all of my information to prove that there was no way I owed them $20,000,” she says.

The bean counters were unmoved. They maintained that Chloe had reported her after-tax income instead of her before-tax income. As a result, they increased the amount she owed to $30,000. She agreed to a payment plan, which will see her pay off the debt in fortnightly installments of $50 over the course of two decades. “I even looked into bankruptcy because I was so stressed by it,” she says. “All I could think about was the Centrelink debt, and once they upped it to 30k, I was so ashamed and sad and miserable,” she says.
austerity  algorithms  automation  dystopia  australia  government  debt-collectors  robo-debt  dole  benefit  grim-meathook-future 
6 weeks ago
lemire/JavaFastPFOR: A simple integer compression library in Java

a library to compress and uncompress arrays of integers very fast. The assumption is that most (but not all) values in your array use much less than 32 bits, or that the gaps between the integers use much less than 32 bits. These sort of arrays often come up when using differential coding in databases and information retrieval (e.g., in inverted indexes or column stores).

Please note that random integers are not compressible, by this library or by any other means. If you ever had the means of systematically compressing random integers, you could compress any data source to nothing, by recursive application of your technique.

This library can decompress integers at a rate of over 1.2 billions per second (4.5 GB/s). It is significantly faster than generic codecs (such as Snappy, LZ4 and so on) when compressing arrays of integers.

The library is used in LinkedIn Pinot, a realtime distributed OLAP datastore. Part of this library has been integrated in Parquet (http://parquet.io/). A modified version of the library is included in the search engine Terrier (http://terrier.org/). This libary is used by ClueWeb Tools (https://github.com/lintool/clueweb). It is also used by Apache NiFi.
compression  java  pfor  encoding  integers  algorithms  storage 
6 weeks ago
A Closer Look at Experian Big Data and Artificial Intelligence in Durham Police
'UK police bought profiling data for their artificial intelligence (AI) system, deciding whether to hold suspects in custody, from ... Experian.'

'The AI tool uses 34 data categories including the offender’s criminal history, combined with their age, gender and two types of residential postcode. The use of postcode data is problematic in predictive software of this kind as it carries a risk of perpetuating bias towards areas marked by community deprivation.'
experian  marketing  credit-score  data  policing  uk  durham  ai  statistics  crime  hart 
6 weeks ago
If iPads were meant for kids
A long list of the misfeatures that IOS/Android devices have regarding child use. 100% agreed with this
ios  ipad  iphone  parenting  devices  kids  android  youtube 
6 weeks ago
Another reason why your Docker containers may be slow
TL;DR: fadvise() is a bottleneck on Linux machines running many containers
linux  fadvise  filesystems  performance  docker  containers  ops 
7 weeks ago
plugin EVs outsell ICE-driven cars in Norway
56% of cars registered in March 2018 in Norway were plugin EVs rather than fossil-fuel burning ICE vehicles, with Nissan Leafs well in first place
evs  pevs  nissan  cars  driving  norway  green  ev 
7 weeks ago
What worries me about AI – François Chollet – Medium
One path leads to a place that really scares me. The other leads to a more humane future. There’s still time to take the better one. If you work on these technologies, keep this in mind. You may not have evil intentions. You may simply not care. You may simply value your RSUs more than our shared future. But whether or not you care, because you have a hand in shaping the infrastructure of the digital world, your choices affect us all. And you may eventually be held responsible for them.
ai  facebook  newsfeed  technology  future  silicon-valley  google 
7 weeks ago
tomnomnom/gron
'Make JSON greppable!'
json  gron  grep  cli  tools  data  hacking  golang 
7 weeks ago
Online mattress-in-a-box brands: Why are there so many? - Curbed
“People ask me what it takes to get into this space,” said Bryan Murphy, founder and president of Tomorrow Sleep. “If you have a [Google] AdWords account [to buy digital ads] and you know a subcontractor, you can sell a mattress online.”
mattresses  business  economics  retail  adwords  online 
7 weeks ago
rr: lightweight recording & deterministic debugging
aspires to be your primary C/C++ debugging tool for Linux, replacing — well, enhancing — gdb. You record a failure once, then debug the recording, deterministically, as many times as you want. The same execution is replayed every time. rr also provides efficient reverse execution under gdb. Set breakpoints and data watchpoints and quickly reverse-execute to where they were hit.


(via Kevin Lyda and b0rk)
debug  gdb  mozilla  debugging  coding  cli  c++  c 
8 weeks ago
Dalzells of Markethill
an Armagh-based home appliance retail shop, apparently doing good deals and with free delivery to Dublin. recommended by Karlin Lillington: "Superb prices, will do multi-purchase deals, FREE delivery to Meath/Louth/Dublin & bend over backwards to offer service & advice"
via:karlin  armagh  shopping  appliances  kitchen  home  import  tips 
8 weeks ago
Europe dumps 300,000 UK-owned .EU domains into the Brexit bin - The Register

"As a result of the withdrawal of the United Kingdom, a holder of a domain name does no longer fulfil the general eligibility criteria... the Registry for .eu will be entitled to revoke such domain name on its own initiative and without submitting the dispute to any extrajudicial settlement of conflicts."


Apply usual Reg pinch of salt of course. The real announcement states 'this information is subject to any transitional arrangement that may be contained in a possible withdrawal agreement, which is an ongoing negotiation between the United Kingdom and European Commission.' So I guess the plan is to get an agreement in place to avoid this.
brexit  domains  dot-eu  eu  uk  dns  the-register 
8 weeks ago
Examine.com
Scientific review of nutritional supplements and vitamins, rounding up hundreds of papers and weighting them based on the level of evidence provided
health  food  nutrition  vitamins  supplements  science  medicine  review  vitamin 
8 weeks ago
'Stop hosting GDC in SF' twitter thread
Emre Deniz: 'My GDC feedback was simple:

Stop hosting it in SF.

I'll be going back for tourist stuff but for the conference it needs to go. SF is a dangerous city and America is not welcome to non western developers.

The city hates us being there, we are worried being there, move it.'


The twitter thread is replete with scary stories of robberies, TSA hassling attendees, etc.
san-francisco  us  safety  gdc  conferences  travel 
8 weeks ago
« earlier      
abuse ads ai algorithms amazon analytics android anti-spam apache apple apps architecture art automation aws banking big-data bitcoin books bugs build business cars cassandra censorship children china cli coding compression concurrency containers copyright crime crypto culture cycling data data-protection data-structures databases dataviz debugging deployment design devops distcomp distributed dns docker driving dublin ec2 email eu europe exploits facebook fail false-positives fault-tolerance filesharing filtering food fraud funny future games gaming gc gchq git github go google government graphics hacking hacks hadoop hardware hashing health history home http https images internet ios ip iphone ireland isps java javascript jobs journalism jvm kafka kids lambda languages latency law legal libraries life linux load-balancing logging machine-learning malware mapping maps medicine memory metrics microsoft ml mobile money monitoring movies mp3 music mysql netflix network networking news nosql nsa open-source ops optimization outages packaging papers patents pdf performance phones photos piracy politics presentations privacy programming protocols python realtime recipes redis reference reliability replication research ruby russia s3 safety scala scalability scaling scams science search security shopping slides snooping social-media society software space spam sql ssl startups statistics storage streaming surveillance swpats sysadmin tcp tech testing time tips tls tools travel tuning tv twitter ui uk unix us-politics via:fanf via:nelson video web wifi work youtube

Copy this bookmark:



description:


tags: