Skip to main content

Home/ TOK Friends/ Group items tagged sabotage

Rss Feed Group items tagged

Javier E

The Creepy New Wave of the Internet by Sue Halpern | The New York Review of Books - 0 views

  • as human behavior is tracked and merchandized on a massive scale, the Internet of Things creates the perfect conditions to bolster and expand the surveillance state.
  • In the world of the Internet of Things, your car, your heating system, your refrigerator, your fitness apps, your credit card, your television set, your window shades, your scale, your medications, your camera, your heart rate monitor, your electric toothbrush, and your washing machine—to say nothing of your phone—generate a continuous stream of data that resides largely out of reach of the individual but not of those willing to pay for it or in other ways commandeer it.
  • That is the point: the Internet of Things is about the “dataization” of our bodies, ourselves, and our environment. As a post on the tech website Gigaom put it, “The Internet of Things isn’t about things. It’s about cheap data.
  • ...3 more annotations...
  • the ubiquity of the Internet of Things is putting us squarely in the path of hackers, who will have almost unlimited portals into our digital lives.
  • Forbes reported that security researchers had come up with a $20 tool that was able to remotely control a car’s steering, brakes, acceleration, locks, and lights. It was an experiment that, again, showed how simple it is to manipulate and sabotage the smartest of machines, even though—but really because—a car is now, in the words of a Ford executive, a “cognitive device.”
  • a study of ten popular IoT devices by the computer company Hewlett-Packard uncovered a total of 250 security flaws among them. As Jerry Michalski, a former tech industry analyst and founder of the REX think tank, observed in a recent Pew study: “Most of the devices exposed on the internet will be vulnerable. They will also be prone to unintended consequences: they will do things nobody designed for beforehand, most of which will be undesirable.”
kushnerha

The Data Against Kant - The New York Times - 0 views

  • THE history of moral philosophy is a history of disagreement, but on one point there has been virtual unanimity: It would be absurd to suggest that we should do what we couldn’t possibly do.
  • This principle — that “ought” implies “can,” that our moral obligations can’t exceed our abilities — played a central role in the work of Immanuel Kant and has been widely accepted since.
  • His thought experiments go something like this: Suppose that you and a friend are both up for the same job in another city. She interviewed last weekend, and your flight for the interview is this evening. Your car is in the shop, though, so your friend promises to drive you to the airport. But on the way, her car breaks down — the gas tank is leaking — so you miss your flight and don’t get the job.Would it make any sense to tell your friend, stranded at the side of the road, that she ought to drive you to the airport? The answer seems to be an obvious no (after all, she can’t drive you), and most philosophers treat this as all the confirmation they need for the principle.Suppose, however, that the situation is slightly different. What if your friend intentionally punctures her own gas tank to make sure that you miss the flight and she gets the job? In this case, it makes perfect sense to insist that your friend still has an obligation to drive you to the airport. In other words, we might indeed say that someone ought to do what she can’t — if we’re blaming her.
  • ...5 more annotations...
  • In our study, we presented hundreds of participants with stories like the one above and asked them questions about obligation, ability and blame. Did they think someone should keep a promise she made but couldn’t keep? Was she even capable of keeping her promise? And how much was she to blame for what happened?
  • We found a consistent pattern, but not what most philosophers would expect. “Ought” judgments depended largely on concerns about blame, not ability. With stories like the one above, in which a friend intentionally sabotages you, 60 percent of our participants said that the obligation still held — your friend still ought to drive you to the airport. But with stories in which the inability to help was accidental, the obligation all but disappeared. Now, only 31 percent of our participants said your friend still ought to drive you.
  • Professor Sinnott-Armstrong’s unorthodox intuition turns out to be shared by hundreds of nonphilosophers. So who is right? The vast majority of philosophers, or our participants?One possibility is that our participants were wrong, perhaps because their urge to blame impaired the accuracy of their moral judgments. To test this possibility, we stacked the deck in the favor of philosophical orthodoxy: We had the participants look at cases in which the urge to assign blame would be lowest — that is, only the cases in which the car accidentally broke down. Even still, we found no relationship between “ought” and “can.” The only significant relationship was between “ought” and “blame.”
  • This finding has an important implication: Even when we say that someone has no obligation to keep a promise (as with your friend whose car accidentally breaks down), it seems we’re saying it not because she’s unable to do it, but because we don’t want to unfairly blame her for not keeping it. Again, concerns about blame, not about ability, dictate how we understand obligation.
  • While this one study alone doesn’t refute Kant, our research joins a recent salvo of experimental work targeting the principle that “ought” implies “can.” At the very least, philosophers can no longer treat this principle as obviously true.
ilanaprincilus06

World Leaders React To Pro-Trump Extremists Storming U.S. Capitol : Insurrection At The... - 0 views

  • The spectacle transfixed people around the globe.
  • "Disgraceful scenes in U.S. Congress," Prime Minister Boris Johnson of Britain tweeted. "The United States stands for democracy around the world and it is now vital that there should be a peaceful and orderly transfer of power."
  • Violence is incompatible with the exercise of democratic rights and freedoms.
  • ...6 more annotations...
  • "A basic rule of democracy is that after elections there are winners and losers," Merkel said. "Both have their part to play with decency and responsibility so that democracy itself remains secure.
  • "The enemies of democracy will be delighted at these terrible images from Washington DC."
  • He noted that for generations, American democracy has inspired millions of people, including him.
  • I have no doubt that American democracy will prevail — it always has."
  • "Everyone saw what a populist did to his country and damaged his country's reputation in the international arena."
  • "While people in Palestine & in many other places in the world are struggling to achieve democracy, there are those in the US who are actively sabotaging theirs,"
Javier E

Avoidance, not anxiety, may be sabotaging your life - The Washington Post - 0 views

  • Anxiety, for many people, is like an unwelcome houseguest — a lingering presence that causes tension, clouds the mind with endless “what ifs” and shows up as various physical sensations.
  • About 12 percent of U.S. adults regularly felt worry, nervousness or anxiety, according to a National Health Interview Survey conducted between October and December 2022.
  • Anxiety, though, is not the puppeteer pulling the strings in many of our lives. There is a more subtle and insidious marionette, and it’s called psychological avoidance. When we avoid certain situations and decisions, it can lead to heightened anxiety and more problems.
  • ...23 more annotations...
  • Psychological avoidance is akin to an ostrich burying its head in the sand, choosing ignorance over confrontation, all while a storm brews in the background.
  • depression and anxiety disorders cost the global economy $1 trillion each year in lost productivity.
  • avoidance, a strategy that not only fails to solve problems but fuels them.
  • Psychological avoidance isn’t about the actions we take or don’t take, but the intentions behind them. If our actions aim to squash discomfort hastily, then we’re probably 2favoiding
  • the three ways people tend to practice psychological avoidance.
  • Reacting
  • It’s when we reply hastily to an email that upsets us or raise our voices without considering the consequences.
  • Reacting is any response that seeks to eliminate the source of discomfort
  • Retreating
  • Retreating is the act of moving away or pulling back from anxiety-inducing situations
  • For example, my client with the fear of public speaking took a different job to avoid it. Others may reach for a glass of wine to numb out o
  • Remaining
  • Remaining is sticking to the status quo to avoid the discomfort of change.
  • Psychological avoidance is a powerful enemy, but there are three science-based skills to fight it.
  • Shifting involves checking in with your thoughts, especially when anxiety comes knocking. In those moments, we often have black-and-white, distorted thoughts, just like my client, who was worried about being in a romantic relationship, telling himself, “I will never be in a good relationship.”
  • Shifting is taking off dark, monochrome glasses and seeing the world in color again. Challenge your thoughts, clean out your lenses, by asking yourself, “Would I say this to my best friend in this scenario?
  • Approaching
  • taking a step that feels manageable.
  • The opposite of avoiding is approaching
  • Ask yourself: What is one small step I can take toward my fears and anxiety to overcome my avoidance.
  • Aligning
  • Aligning is living a values-driven life, where our daily actions are aligned with what matters the most to us: our values.
  • This is the opposite of what most of us do while anxious. In moments of intense anxiety, we tend to let our emotions, not our values, dictate our actions. To live a values-driven life, we need to first identify our values, whether that is health, family, work or something else. Then we need to dedicate time and effort to our values.
Javier E

Whistleblower: Twitter misled investors, FTC and underplayed spam issues - Washington Post - 0 views

  • Twitter executives deceived federal regulators and the company’s own board of directors about “extreme, egregious deficiencies” in its defenses against hackers, as well as its meager efforts to fight spam, according to an explosive whistleblower complaint from its former security chief.
  • The complaint from former head of security Peiter Zatko, a widely admired hacker known as “Mudge,” depicts Twitter as a chaotic and rudderless company beset by infighting, unable to properly protect its 238 million daily users including government agencies, heads of state and other influential public figures.
  • Among the most serious accusations in the complaint, a copy of which was obtained by The Washington Post, is that Twitter violated the terms of an 11-year-old settlement with the Federal Trade Commission by falsely claiming that it had a solid security plan. Zatko’s complaint alleges he had warned colleagues that half the company’s servers were running out-of-date and vulnerable software and that executives withheld dire facts about the number of breaches and lack of protection for user data, instead presenting directors with rosy charts measuring unimportant changes.
  • ...56 more annotations...
  • The complaint — filed last month with the Securities and Exchange Commission and the Department of Justice, as well as the FTC — says thousands of employees still had wide-ranging and poorly tracked internal access to core company software, a situation that for years had led to embarrassing hacks, including the commandeering of accounts held by such high-profile users as Elon Musk and former presidents Barack Obama and Donald Trump.
  • the whistleblower document alleges the company prioritized user growth over reducing spam, though unwanted content made the user experience worse. Executives stood to win individual bonuses of as much as $10 million tied to increases in daily users, the complaint asserts, and nothing explicitly for cutting spam.
  • Chief executive Parag Agrawal was “lying” when he tweeted in May that the company was “strongly incentivized to detect and remove as much spam as we possibly can,” the complaint alleges.
  • Zatko described his decision to go public as an extension of his previous work exposing flaws in specific pieces of software and broader systemic failings in cybersecurity. He was hired at Twitter by former CEO Jack Dorsey in late 2020 after a major hack of the company’s systems.
  • “I felt ethically bound. This is not a light step to take,” said Zatko, who was fired by Agrawal in January. He declined to discuss what happened at Twitter, except to stand by the formal complaint. Under SEC whistleblower rules, he is entitled to legal protection against retaliation, as well as potential monetary rewards.
  • “Security and privacy have long been top companywide priorities at Twitter,” said Twitter spokeswoman Rebecca Hahn. She said that Zatko’s allegations appeared to be “riddled with inaccuracies” and that Zatko “now appears to be opportunistically seeking to inflict harm on Twitter, its customers, and its shareholders.” Hahn said that Twitter fired Zatko after 15 months “for poor performance and leadership.” Attorneys for Zatko confirmed he was fired but denied it was for performance or leadership.
  • A person familiar with Zatko’s tenure said the company investigated Zatko’s security claims during his time there and concluded they were sensationalistic and without merit. Four people familiar with Twitter’s efforts to fight spam said the company deploys extensive manual and automated tools to both measure the extent of spam across the service and reduce it.
  • Overall, Zatko wrote in a February analysis for the company attached as an exhibit to the SEC complaint, “Twitter is grossly negligent in several areas of information security. If these problems are not corrected, regulators, media and users of the platform will be shocked when they inevitably learn about Twitter’s severe lack of security basics.”
  • Zatko’s complaint says strong security should have been much more important to Twitter, which holds vast amounts of sensitive personal data about users. Twitter has the email addresses and phone numbers of many public figures, as well as dissidents who communicate over the service at great personal risk.
  • This month, an ex-Twitter employee was convicted of using his position at the company to spy on Saudi dissidents and government critics, passing their information to a close aide of Crown Prince Mohammed bin Salman in exchange for cash and gifts.
  • Zatko’s complaint says he believed the Indian government had forced Twitter to put one of its agents on the payroll, with access to user data at a time of intense protests in the country. The complaint said supporting information for that claim has gone to the National Security Division of the Justice Department and the Senate Select Committee on Intelligence. Another person familiar with the matter agreed that the employee was probably an agent.
  • “Take a tech platform that collects massive amounts of user data, combine it with what appears to be an incredibly weak security infrastructure and infuse it with foreign state actors with an agenda, and you’ve got a recipe for disaster,” Charles E. Grassley (R-Iowa), the top Republican on the Senate Judiciary Committee,
  • Many government leaders and other trusted voices use Twitter to spread important messages quickly, so a hijacked account could drive panic or violence. In 2013, a captured Associated Press handle falsely tweeted about explosions at the White House, sending the Dow Jones industrial average briefly plunging more than 140 points.
  • After a teenager managed to hijack the verified accounts of Obama, then-candidate Joe Biden, Musk and others in 2020, Twitter’s chief executive at the time, Jack Dorsey, asked Zatko to join him, saying that he could help the world by fixing Twitter’s security and improving the public conversation, Zatko asserts in the complaint.
  • In 1998, Zatko had testified to Congress that the internet was so fragile that he and others could take it down with a half-hour of concentrated effort. He later served as the head of cyber grants at the Defense Advanced Research Projects Agency, the Pentagon innovation unit that had backed the internet’s invention.
  • But at Twitter Zatko encountered problems more widespread than he realized and leadership that didn’t act on his concerns, according to the complaint.
  • Twitter’s difficulties with weak security stretches back more than a decade before Zatko’s arrival at the company in November 2020. In a pair of 2009 incidents, hackers gained administrative control of the social network, allowing them to reset passwords and access user data. In the first, beginning around January of that year, hackers sent tweets from the accounts of high-profile users, including Fox News and Obama.
  • Several months later, a hacker was able to guess an employee’s administrative password after gaining access to similar passwords in their personal email account. That hacker was able to reset at least one user’s password and obtain private information about any Twitter user.
  • Twitter continued to suffer high-profile hacks and security violations, including in 2017, when a contract worker briefly took over Trump’s account, and in the 2020 hack, in which a Florida teen tricked Twitter employees and won access to verified accounts. Twitter then said it put additional safeguards in place.
  • This year, the Justice Department accused Twitter of asking users for their phone numbers in the name of increased security, then using the numbers for marketing. Twitter agreed to pay a $150 million fine for allegedly breaking the 2011 order, which barred the company from making misrepresentations about the security of personal data.
  • After Zatko joined the company, he found it had made little progress since the 2011 settlement, the complaint says. The complaint alleges that he was able to reduce the backlog of safety cases, including harassment and threats, from 1 million to 200,000, add staff and push to measure results.
  • But Zatko saw major gaps in what the company was doing to satisfy its obligations to the FTC, according to the complaint. In Zatko’s interpretation, according to the complaint, the 2011 order required Twitter to implement a Software Development Life Cycle program, a standard process for making sure new code is free of dangerous bugs. The complaint alleges that other employees had been telling the board and the FTC that they were making progress in rolling out that program to Twitter’s systems. But Zatko alleges that he discovered that it had been sent to only a tenth of the company’s projects, and even then treated as optional.
  • “If all of that is true, I don’t think there’s any doubt that there are order violations,” Vladeck, who is now a Georgetown Law professor, said in an interview. “It is possible that the kinds of problems that Twitter faced eleven years ago are still running through the company.”
  • The complaint also alleges that Zatko warned the board early in his tenure that overlapping outages in the company’s data centers could leave it unable to correctly restart its servers. That could have left the service down for months, or even have caused all of its data to be lost. That came close to happening in 2021, when an “impending catastrophic” crisis threatened the platform’s survival before engineers were able to save the day, the complaint says, without providing further details.
  • One current and one former employee recalled that incident, when failures at two Twitter data centers drove concerns that the service could have collapsed for an extended period. “I wondered if the company would exist in a few days,” one of them said.
  • The current and former employees also agreed with the complaint’s assertion that past reports to various privacy regulators were “misleading at best.”
  • For example, they said the company implied that it had destroyed all data on users who asked, but the material had spread so widely inside Twitter’s networks, it was impossible to know for sure
  • As the head of security, Zatko says he also was in charge of a division that investigated users’ complaints about accounts, which meant that he oversaw the removal of some bots, according to the complaint. Spam bots — computer programs that tweet automatically — have long vexed Twitter. Unlike its social media counterparts, Twitter allows users to program bots to be used on its service: For example, the Twitter account @big_ben_clock is programmed to tweet “Bong Bong Bong” every hour in time with Big Ben in London. Twitter also allows people to create accounts without using their real identities, making it harder for the company to distinguish between authentic, duplicate and automated accounts.
  • In the complaint, Zatko alleges he could not get a straight answer when he sought what he viewed as an important data point: the prevalence of spam and bots across all of Twitter, not just among monetizable users.
  • Zatko cites a “sensitive source” who said Twitter was afraid to determine that number because it “would harm the image and valuation of the company.” He says the company’s tools for detecting spam are far less robust than implied in various statements.
  • “Agrawal’s Tweets and Twitter’s previous blog posts misleadingly imply that Twitter employs proactive, sophisticated systems to measure and block spam bots,” the complaint says. “The reality: mostly outdated, unmonitored, simple scripts plus overworked, inefficient, understaffed, and reactive human teams.”
  • The four people familiar with Twitter’s spam and bot efforts said the engineering and integrity teams run software that samples thousands of tweets per day, and 100 accounts are sampled manually.
  • Some employees charged with executing the fight agreed that they had been short of staff. One said top executives showed “apathy” toward the issue.
  • Zatko’s complaint likewise depicts leadership dysfunction, starting with the CEO. Dorsey was largely absent during the pandemic, which made it hard for Zatko to get rulings on who should be in charge of what in areas of overlap and easier for rival executives to avoid collaborating, three current and former employees said.
  • For example, Zatko would encounter disinformation as part of his mandate to handle complaints, according to the complaint. To that end, he commissioned an outside report that found one of the disinformation teams had unfilled positions, yawning language deficiencies, and a lack of technical tools or the engineers to craft them. The authors said Twitter had no effective means of dealing with consistent spreaders of falsehoods.
  • Dorsey made little effort to integrate Zatko at the company, according to the three employees as well as two others familiar with the process who spoke on the condition of anonymity to describe sensitive dynamics. In 12 months, Zatko could manage only six one-on-one calls, all less than 30 minutes, with his direct boss Dorsey, who also served as CEO of payments company Square, now known as Block, according to the complaint. Zatko allegedly did almost all of the talking, and Dorsey said perhaps 50 words in the entire year to him. “A couple dozen text messages” rounded out their electronic communication, the complaint alleges.
  • Faced with such inertia, Zatko asserts that he was unable to solve some of the most serious issues, according to the complaint.
  • Some 30 percent of company laptops blocked automatic software updates carrying security fixes, and thousands of laptops had complete copies of Twitter’s source code, making them a rich target for hackers, it alleges.
  • A successful hacker takeover of one of those machines would have been able to sabotage the product with relative ease, because the engineers pushed out changes without being forced to test them first in a simulated environment, current and former employees said.
  • “It’s near-incredible that for something of that scale there would not be a development test environment separate from production and there would not be a more controlled source-code management process,” said Tony Sager, former chief operating officer at the cyberdefense wing of the National Security Agency, the Information Assurance divisio
  • Sager is currently senior vice president at the nonprofit Center for Internet Security, where he leads a consensus effort to establish best security practices.
  • Zatko stopped the material from being presented at the Dec. 9, 2021 meeting, the complaint said. But over his continued objections, Agrawal let it go to the board’s smaller Risk Committee a week later.
  • “A best practice is that you should only be authorized to see and access what you need to do your job, and nothing else,” said former U.S. chief information security officer Gregory Touhill. “If half the company has access to and can make configuration changes to the production environment, that exposes the company and its customers to significant risk.”
  • The complaint says Dorsey never encouraged anyone to mislead the board about the shortcomings, but that others deliberately left out bad news.
  • The complaint says that about half of Twitter’s roughly 7,000 full-time employees had wide access to the company’s internal software and that access was not closely monitored, giving them the ability to tap into sensitive data and alter how the service worked. Three current and former employees agreed that these were issues.
  • An unnamed executive had prepared a presentation for the new CEO’s first full board meeting, according to the complaint. Zatko’s complaint calls the presentation deeply misleading.
  • The presentation showed that 92 percent of employee computers had security software installed — without mentioning that those installations determined that a third of the machines were insecure, according to the complaint.
  • Another graphic implied a downward trend in the number of people with overly broad access, based on the small subset of people who had access to the highest administrative powers, known internally as “God mode.” That number was in the hundreds. But the number of people with broad access to core systems, which Zatko had called out as a big problem after joining, had actually grown slightly and remained in the thousands.
  • The presentation included only a subset of serious intrusions or other security incidents, from a total Zatko estimated as one per week, and it said that the uncontrolled internal access to core systems was responsible for just 7 percent of incidents, when Zatko calculated the real proportion as 60 percent.
  • When Dorsey left in November 2021, a difficult situation worsened under Agrawal, who had been responsible for security decisions as chief technology officer before Zatko’s hiring, the complaint says.
  • Agrawal didn’t respond to requests for comment. In an email to employees after publication of this article, obtained by The Post, he said that privacy and security continues to be a top priority for the company, and he added that the narrative is “riddled with inconsistences” and “presented without important context.”
  • On Jan. 4, Zatko reported internally that the Risk Committee meeting might have been fraudulent, which triggered an Audit Committee investigation.
  • Agarwal fired him two weeks later. But Zatko complied with the company’s request to spell out his concerns in writing, even without access to his work email and documents, according to the complaint.
  • Since Zatko’s departure, Twitter has plunged further into chaos with Musk’s takeover, which the two parties agreed to in May. The stock price has fallen, many employees have quit, and Agrawal has dismissed executives and frozen big projects.
  • Zatko said he hoped that by bringing new scrutiny and accountability, he could improve the company from the outside.
  • “I still believe that this is a tremendous platform, and there is huge value and huge risk, and I hope that looking back at this, the world will be a better place, in part because of this.”
Javier E

Opinion | Jeff Zucker Was Right to Resign. But I Can't Judge Him. - The New York Times - 0 views

  • As animals, we are not physically well designed to sit at a desk for a minimum of 40 hours a week staring at screens. That so many of our waking hours are devoted to work in the first place is a very modern development that can easily erode our mental health and sense of self. We are a higher species capable of observing restraint, but we are also ambulatory clusters of needs and desires, with which evolution has both protected and sabotaged us.
  • Professional life, especially in a culture as work-obsessed as America’s, forces us into a lot of unnatural postures
  • it’s no surprise, when work occupies so much of our attention, that people sometimes find deep human connections there, even when they don’t intend to, and even when it’s inappropriate.
  • ...2 more annotations...
  • it’s worth acknowledging that adhering to these necessary rules cuts against some core aspects of human nature. I’m of the opinion that people should not bring their “whole self” to work — no one owes an employer that — but it’s also impossible to bring none of your personal self to work.
  • There are good reasons that both formal and informal boundaries are a necessity in the workplace and academia
Javier E

Twitter is dying | TechCrunch - 0 views

  • if the point is simply pure destruction — building a chaos machine by removing a source of valuable information from our connected world, where groups of all stripes could communicate and organize, and replacing that with a place of parody that rewards insincerity, time-wasting and the worst forms of communication in order to degrade the better half — then he’s done a remarkable job in very short order. Truly it’s an amazing act of demolition. But, well, $44 billion can buy you a lot of wrecking balls.
  • That our system allows wealth to be turned into a weapon to nuke things of broad societal value is one hard lesson we should take away from the wreckage of downed turquoise feathers.
  • We should also consider how the ‘rules based order’ we’ve devised seems unable to stand up to a bully intent on replacing free access to information with paid disinformation — and how our democratic systems seem so incapable and frozen in the face of confident vandals running around spray-painting ‘freedom’ all over the walls as they burn the library down.
  • ...2 more annotations...
  • The simple truth is that building something valuable — whether that’s knowledge, experience or a network worth participating in — is really, really hard. But tearing it all down is piss easy.
  • It almost doesn’t matter if this is deliberate sabotage by Musk or the blundering stupidity of a clueless idiot.
1 - 9 of 9
Showing 20 items per page