1,282 Matching Annotations
  1. Jul 2020
    1. White supremacists marched with torches during a rally in Charlottesville, Va.Credit...Edu Bayer for The New York Times

      Fire has historically been used in battle, and as a fear tactic. Take the Great Fire of London in 1666, which destroyed thousands upon thousands of homes, churches, and businesses. While that fire may have been an accident, it's a testament to the destructive power of fire.

      There are many things, passive and active, that white supremacists could accomplish with such tiki torches, including burning people of color in direct combat. Considering the nature of white supremacy, I'm surprised I have not seen such accounts of violence on the news.

    2. SAN FRANCISCO — Riding a motorized pony and strumming a cigar box ukulele, Dana Cory led a singalong to the tune of “If you’re happy and you know it clap your hands.”“You’re a Nazi and you’re fired, it’s your fault,” she sang. “You were spotted in a mob, now you lost your freaking job. You’re a Nazi and you’re fired, it’s your fault.”“All together now!” Ms. Cory, 48, shouted to a cheering crowd in San Francisco’s Castro neighborhood on Saturday. They were protesting a rally planned by far-right organizers about a mile away.“Dox a Nazi all day, every day,” she said.

      Well, that's a heck of a way to start off an article.

      Honestly, there's a certain sort of camaraderie within protests. Not all of them are jovial, as what seems to be going on here, but by their nature, they're very passionate. At the BLM protest in Walnut Creek I attended, we were blowing out our lungs chanting in support of the fallen, and I ended up getting swept away on a wave of justified anger by the time we flooded onto the freeway. A large source of anger amongst the protestors is that the cops overseeing the protests, for the most part, covered their badge numbers and other identifying teachers, meaning that by the time tear gas and rubber bullets were on the table, there was no enemy more specific than the Walnut Creek Police Department. You can't exactly doxx a whole police department and expect it to have as severe of a consequence as if the individual police officers were prosecuted individually.

      P.S.: I note the bias in my annotation, but the difficulty in diffuse consequences stands.

    1. It was, after all, the digital equivalent of must-see TV. “Have not been this riveted since the final episode of Lost, and this *didn’t* piss me off! Amazing!” wrote one Twitter user in reply to Blair’s thread. “Please @TheEllenShow have a look on it! We need to know more about this happy end,” wrote another. Blair should be credited, if nothing else, with spinning the relatively unremarkable behavior of two strangers into such a simple but compelling story.

      This is a remarkable insight. While I can definitely empathize with the entertainment value of such a livestream type of entertainment, having watched people make fools of themselves online or play video games, the involuntary aspect of it is unsettling. Saying that these happenings didn't piss them off means that the Twitter user came in with an expectation that this unfolding story should be consumable and intriguing while not breaking off or taking a drastic turn for the worse, as many "first-date" type scenarios do. And I wouldn't even consider this a real first date! Then again, I'm not one to speak for the duo involved.

    2. This is the Faustian alchemy of social media: we are all given the opportunity to become celebrities in an instant, sometimes for nonsensical reasons, with or without our input. But we gain virtually none of the benefits of that fame, none of the glamor or the institutional support to help deal with the invasiveness of celebrity and how it can eat away at every boundary you ever took for granted.

      We don't get to control our own coverage online. Sure, with lawyers and copyright strikes, you can control the spread to the extent, but without an overruling power, such as in the Democratic Peoples' Republic of Korea (AKA: North Korea), people are free to access, interpret, and share information mostly at their own discretion. This is a great thing in the context of freedom, but this also can lead the the spread of misinformation, confusion, and untoward feelings.

  2. Jun 2020
    1. Then there’s the increasingly fluid and expanding nature of the jobs we do, which increases our need to learn more and adapt quickly. All of these factors combined can result in overload, confusion and serious obstacles to progress. The very information that should be helping us, is creating a barrier to learning. There’s simply too much to read and not enough time to read it.

      Information overload

    1. Just as journalists should be able to write about anything they want, comedians should be able to do the same and tell jokes about anything they please

      where's the line though? every output generates a feedback loop with the hivemind, turning into input to ourselves with our cracking, overwhelmed, filters

      it's unrealistic to wish everyone to see jokes are jokes, to rely on journalists to generate unbiased facts, and politicians as self serving leeches, err that's my bias speaking

    1. Oliver, N., Lepri, B., Sterly, H., Lambiotte, R., Deletaille, S., Nadai, M. D., Letouzé, E., Salah, A. A., Benjamins, R., Cattuto, C., Colizza, V., Cordes, N. de, Fraiberger, S. P., Koebe, T., Lehmann, S., Murillo, J., Pentland, A., Pham, P. N., Pivetta, F., … Vinck, P. (2020). Mobile phone data for informing public health actions across the COVID-19 pandemic life cycle. Science Advances, 6(23), eabc0764. https://doi.org/10.1126/sciadv.abc0764

  3. May 2020
    1. Betsch, C., Wieler, L., Bosnjak, M., Ramharter, M., Stollorz, V., Omer, S., Korn, L., Sprengholz, P., Felgendreff, L., Eitze, S., & Schmid, P. (2020). Germany COVID-19 Snapshot MOnitoring (COSMO Germany): Monitoring knowledge, risk perceptions, preventive behaviours, and public trust in the current coronavirus outbreak in Germany. https://doi.org/10.23668/PSYCHARCHIVES.2776

    1. Early compilations involved various combinations of four crucial operations: storing, sorting, selecting, and summarizing, which I think of as the four S’s of text management. We too store, sort, select, and summarize information, but now we rely not only on human memory, manuscript, and print, as in earlier centuries, but also on computer chips, search functions, data mining, and Wikipedia, along with other electronic techniques.
    1. While tree-space has an abundance of context, leaf-space has an abundance of salience.

      I've contemplated before how to keep the wiki-like edit history of a live simultaneous multi-chat in a client like etherpad. Each speaker has a different color and can type at the same time, but how could one archive the date/timestamps along with the original as well as who each speaker was?

    1. The goal of the W3C Semantic Web Education and Outreach group's Linking Open Data community project is to extend the Web with a data commons by publishing various open datasets as RDF on the Web and by setting RDF links between data items from different data sources.
    1. Google encouraging site admins to put reCaptcha all over their sites, and then sharing the resulting risk scores with those admins is great for security, Perona thinks, because he says it “gives site owners more control and visibility over what’s going on” with potential scammer and bot attacks, and the system will give admins more accurate scores than if reCaptcha is only using data from a single webpage to analyze user behavior. But there’s the trade-off. “It makes sense and makes it more user-friendly, but it also gives Google more data,”
    2. For instance, Google’s reCaptcha cookie follows the same logic of the Facebook “like” button when it’s embedded in other websites—it gives that site some social media functionality, but it also lets Facebook know that you’re there.
    1. By itself the name John Smith may not always be personal data because there are many individuals with that name. However, where the name is combined with other information (such as an address, a place of work, or a telephone number) this will usually be sufficient to clearly identify one individual.
    2. Simply because you do not know the name of an individual does not mean you cannot identify that individual. Many of us do not know the names of all our neighbours, but we are still able to identify them.
    3. Perhaps the biggest implication of this is that, under certain circumstances, personal data includes online identifiers such as IP addresses and mobile device IDs
    4. an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person
    1. Under the scope of the CCPA, “personal information” is defined as “information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.”
  4. Apr 2020
    1. Before we get to passwords, surely you already have in mind that Google knows everything about you. It knows what websites you’ve visited, it knows where you’ve been in the real world thanks to Android and Google Maps, it knows who your friends are thanks to Google Photos. All of that information is readily available if you log in to your Google account. You already have good reason to treat the password for your Google account as if it’s a state secret.
    1. At the same time, we need to ensure that no information about other unsafe usernames or passwords leaks in the process, and that brute force guessing is not an option. Password Checkup addresses all of these requirements by using multiple rounds of hashing, k-anonymity, and private set intersection with blinding.
    1. Dorison, C., Lerner, J. S., Heller, B. H., Rothman, A., Kawachi, I. I., Wang, K., … Coles, N. A. (2020, April 16). A global test of message framing on behavioural intentions, policy support, information seeking, and experienced anxiety during the COVID-19 pandemic. https://doi.org/10.31234/osf.io/sevkf

    1. Daniel Markovits, author of “The Meritocracy Trap,” estimates there are about one million of these workers in America today. They work really hard, are really productive and earn a lot more. In the mid-1960s, profits per partner at elite law firms were less than five times a secretary’s salary. Now, Markovits notes, they are over 40 times.

      That latter statistic is fascinating. Are top partners 8x more more productive (relatively) than secretaries? Maybe but probably not. There's more going on that the crude info economy argument of simply greater marginal productivity. I would also look at concentration of income across law firms - i bet there has been concentration towards the top firms.

    2. But here’s the situation: The information economy rains money on highly trained professionals — doctors, lawyers, corporate managers, engineers and so on.

      But why does it rain money on them? And who else does that?

    1. For instance, if an IP address is sent with an ad request (which will be the case with almost any ad request as a consequence of internet protocols), that transmission will not breach any prohibition on sending PII to Google.
    2. Google interprets PII to exclude, for example: pseudonymous cookie IDs pseudonymous advertising IDs IP addresses
    3. data excluded from Google's interpretation of PII may still be considered personal data under the GDPR
  5. Mar 2020
    1. Article 4 of GPPR defines personal data as any information relating to an identified or identifiable natural person (‘data subject’). The definition not only covers all sorts of online identifiers (eg. networks’ IP address, device ID or cookie identifier) but also the combinations of browser characteristics that fingerprinting relies on (see: Recital 30). And since the information collected using fingerprinting allows you to identify users between sessions, it’s considered personal identifier. Hence, this technique doesn’t meet the data anonymization standards.
    1. the introduction of the EU’s General Data-Protection Regulation (GDPR) has significantly impacted the way websites and business collect, store and use both types of cookies. For one, the GDPR includes cookies in its definition of personal data, which refers to any piece of data or information that can identify a visitor.
    1. European Court of Justice (ECJ) has handed down a judgement that rules IP Addresses are Personally Identifiable Information (PII)
    2. The European Court of Justice recently ruled that dynamic IP address are now classed as PII.
    3. This was because the court felt he could not be identified based on just the IP address
    1. Comment puis-je être informé de l’évolution de la situation?Vous pouvez trouver les informations, régulièrement réactualisées,sur le site Internet de la circonscription, de l’école, l’environnement numérique de travail ou sur les affichages de l’école. Pour ce qui est plus général, reportez-vous aux grands sites institutionnels, notamment celui du ministère de l’éducation nationale et dela jeunesse: education.gouv.fr
    1. knowledge that is part of what it means to be a free person in the present historical context of the dawn of the information age

      definition - liberal as in free, as in free from control of "clever men"

    2. an extended notion of information literacy is essential to the future of democracy, if citizens are to be intelligent shapers of the information society rather than its pawns
    1. information literates.They have learned techniquesand skills for utilizing the wide range ofinformation tools as well asprimary sources in molding information solutions totheir problems

      initial definition

    2. Information has value indirect onortion to the control it rovides him overwhat he is and whathe can become

      Information has Value

    1. CIVIC will make no attempt to identify individual users. You should be aware, however, that access to web pages will generally create log entries in the systems of your ISP or network service provider. These entities may be in a position to identify the client computer equipment used to access a page.
    1. Oracle hashes the direct and indirect identifiers (such as IP address and cookie ID) in the Sample Dataset. ‘Hashing’ means the personal information cannot be associated with an individual without the use of additional information.