Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Parents need help (Score 1) 80

> If an internet service gathers information about their users and uses said information to feed an algorithm to decide content to provide to users.

Displaying any content to a user is "feeding an algorithm" even if that algorithm is dumb such as "display in chronological order" or "display all posts in order provided by database query"

All websites that provide inter-user communication must "gather information about their users and use said information" -- I must gather a user-id to determine if a user is allowed to post, and that information then feeds a dumb algorithm that I made a post to be shown to all others; Or in the context of a Direct Message, to feed an algorithm whether to that content may be shown to the person messaged.

Any user-to-user communication constitutes a "social network", a social network of 2 people is still a social network.

The devil is in the details, and either the law is so articulately defined, it's easy to find a loop-hole to applicability, or it applies to all websites with minimal logic.

Comment Re:Moronic clickbait (Score 1) 119

Techincal definition, often differs from the vernacular definition.
E.g. Using the scientific, and legal definitions, wood is not flammable. Using the vernacular definition, wood is flammable.

The requirement of believing to be real, is part of the technical definition.
https://www.cancer.gov/publica...
Hallucination.
A sight, sound, smell, taste, or touch that a person believes to be real but is not real. Hallucinations can be caused by nervous system disease, certain drugs, or mental disorders.

-- National Cancer Institute Dictionary of Cancer Terms

  hallucination
n. a false sensory perception that has a compelling sense of reality despite the absence of an external stimulus.
--- APA Dictionary of Psycology.
https://dictionary.apa.org/hal...

Comment Re:"It's automated" is not a valid defense (Score 2) 81

Only chats relevant to the lawsuit need to be retained. That is up to staff working on such products. It would be fooling to disable default retention for the entire company.

We get emails saying: this is our lawsuit, if you have any communications regarding 'specfic keywords mentioned in the lawsuit', make sure you keep them.

Comment Re:Good. This bodes well for personal liberty (Score 2) 179

In America, most people director level and above regularly use illegal drugs. Every Engineering conference, Doctor's conference, Tech conference, all the highly paid staff will be having parties, and business events with the majority of people using coke, heroin, and other substances. The ubiquity of it stems from the fact they now have enough disposable income to have regular, convenient access to safe, quality assured product.

Before stumbling into one of these events, I didn't know such a thing happened, but once known -- I was invited to all the real business meetings, where contracts and negotiations, and networking are done with ... assistance. I was absolutely shocked at all the people, I never would have considered of having a lot of experience with substances at all, let alone hard stuff. It seems like 50% or more of the higher paid staff at companies, even more so of tech people, were completely casual and non-chalant about use. It was eye-opening. It also was a signal to me, that I was going to have a hard time climbing the ranks if this was increasingly common with people at higher ranks.

But they wouldn't describe themselves as addicts -- because they are functional day-to-day. And do hard drugs several times a week. Obligations to family, friends, and work seem to keep their lives in order.

To me, this came off of -- we keep drugs illegal, because when supply is clean and safe, it's no longer only the rich and privileged who have access to clean, safe, unadulterated drugs.

Comment No. Phshing attack, and unlocked phones. (Score 5, Informative) 42

It wasn't cracked.
Cellebrite successfully launched a phishing attack on Twilio.

Specifically, they sent phishing emails to Twilio, the SMS provider.
One admin at Twilio fell for it, and submitted his admin credentials to the Cellebrite.
Once they had admin access, they installed signal on their phone, and used a phone number for the account they wished access to.
The SMS was sent, and they immediately read the message using Twilio's admin tools before it reached the end user.
They signed into the account using the 2FA code.
The user's account they signed in to DID NOT have a registration PIN set. Had this been set, no new installation would be allowed unless BOTH 2FA code and PIN are provided. Had the users set a registration PIN, this SMS diversion attack would not have been enough to log in to the signal account on a new device.

The net result:
Cellebrite had been able to log in to the user's account.
Had NO access to chats.
Had NO access to contacts.
Only ability to pretend to be the user in new chats.

Mitigation:
Set a PIN on the account to prevent registration on new devices. ("Set Registration PIN in security settings).

The Second claim by Cellebrite, was a blog saying they broke the encryption, and could access messages.
This physical access has been known for years, and Signal suggests locking phone, and requiring PIN to access Signal. But, notes, if an adversary physically has your phone, there are many more vectors for attempting to gain access.

The details required:
Phone physically in hand to analyze.
Able to access phone running (either known PIN or phone unlocked)
Signal was NOT configured to have a PIN on startup.
Open Signal.
Read the decryption key from device memory.
Copy LOCAL messages, and use the decryption key to read in bulk. (Or, since you have the app open, read them in the App itself.

Comment Re:The internet was fine... (Score 1) 324

If the score is primarily user driven, it should be covered? Does slashdot have any say in the moderation of comments -- it seems pretty passive and based entirely on user input to me, and also obvious to it's workings.

As opposed to Google, which is a secret unknown algorithm trying to prioritize profit and screen time. Using metrics that are not necessarily user created, but derived from user analysis, and profitability.

Comment Re:The internet was fine... (Score 4, Interesting) 324

The recommendation engine by Slashdot is primarily influenced by end-users and community moderation. Not by slashdot itself.

I can see user-based moderation and recommendations based on user input being protected, particularly if the algortihmn parameters are made public..
But something primarily in the companies hands, with no insight to weights, and primarily to drive profit -- I can see that being out of scope of 230.

Slashdot Top Deals

Say "twenty-three-skiddoo" to logout.

Working...