Get the FREE DIGITAL BOOK: The Case for Killer Robots
Mind Matters Reporting on Natural and Artificial Intelligence

TagTwitter

twitter handle with care.jpg
Twitter handle with care

What’s the Main Thing We Should Learn from the Big Twitter Hack?

Yes, Twitter got control of its platform back but not before its credibility in security matters was significantly weakened

As we reported at the time, on July 15, hackers gained control of a number of Twitter “Blue Checkmark” accounts. Twitter hands out Blue Checkmarks to accounts that exert heavy influence and have verified identities. That status permits many parody accounts to operate without generating confusion over who is really tweeting, the account or the parody. In any case, on Twitter, the Blue Checkmarks have quite a bit of power. They get access to analytics on their posts so they can measure (and manipulate) their engagement with their followers. Many influencers look for “Blue Checkmark” status to see if an account is worth engaging with. Twitter even allows the “Blue Checkmarks” to filter their conversations so as to limit them…

Check mark on shield.jpg
Check mark on shield, Security, safe, privacy or other Security concept background, Data Protection Concept, Technology Background

Hackers Seize Popular Twitter Accounts for Giant Bitcoin Scam

Scammers have gained access to a number of high-profile Twitter accounts, including those of Warren Buffett, Bill Gates, Kanye West, and Elon Musk

Today, hackers gained control of a number of Twitter accounts, and used them to scam people out of their Bitcoin money. As we have reported before, the security within Bitcoin actually seems to facilitate scams. In the current ripoff, scammers have gained access to a number of high-profile Twitter accounts, including those of Warren Buffett, Bill Gates, Kanye West, and Elon Musk. Their usual line is that they are seeking matching donations to a good cause. So if the user sends Bitcoin to a certain wallet address, the high-profile Twitter account will send a matching donation. However, the wallet address (and the promised match) are both frauds, and the money goes straight into the scammers’ pockets. It is unclear how…

iron-chain-and-castle-on-the-silk-national-flag-of-hong-kong-with-beautiful-folds-the-concept-of-a-ban-on-tourism-political-repression-crime-violation-of-the-rights-and-freedoms-of-citizens-stockpack-adobe-stock.jpg
iron chain and castle on the silk national flag of Hong Kong with beautiful folds, the concept of a ban on tourism, political repression, crime, violation of the rights and freedoms of citizens

Hong Kong: Tech Companies Face Serious Ethical Decisions

As Hong Kong is transformed into a police state, Western companies, faced with demands for snitching on users, are rethinking cozy relationships with China

The semi-autonomous region of Hong Kong is no longer semi-autonomous, at least in practice. The Chinese Communist Party (CCP), circumventing Hong Kong’s parliament and courts, passed the Hong Kong National Security Law on June 30 that effectively abolishes the “one country, two systems” regime outlined in the Sino-British Joint Declaration. The law was passed one day before the anniversary of the handover of Hong Kong to China (July 1, 1997), in time to quash any pro-democracy candidates who would likely win in the September elections. Although the CCP justifies its moves from the Hong Kong Basic Law and claims that Hong Kong will maintain autonomy, in practice, it has already arrested dissidents and formed a secretive agency called the Office…

Line-of-Actual-Control-public-domain
Grey Wolf (Canis lupus) Between Trees Looks Up and to Right Winter - captive animal

The Age of the Wolf Warrior: China’s Post-Pandemic Strategy

The younger diplomats take their cue from a Chinese Rambo-style movie and the rewritten history they learned at school

While countries around the world have been dealing with the spread of COVID-19 (coronavirus), China has claimed disputed areas in the South China Sea, taken over the Hong Kong government, and flown planes over Taiwan. One result was a standoff between warships from the U.S., Australia, and China. A 2016 international tribunal in The Hague ruled that China has no legal sovereignty over most of the South China Sea. China, saying that the ruling was void, claims areas that are also claimed by Vietnam, Taiwan, Malaysia, Brunei, the Philippines, and Japan. The Chinese Liberation Army has also increased the number of troops at its border with India (the Line of Actual Control) disputed since the Sino-Indian war in 1962 (below…

pathum-danthanarayana-466070-unsplash

A Scientist’s Nightmare: Doxxed on Twitter

The surprisingly good news is that online riots may be hurting the Twitter brand
The market for senseless outrage is not as large as expected and the online riots may actually be hurting the Twitter brand. Many sources say that Twitter has been losing accounts for years. Read More ›
marc-schafer-631509-unsplash

How Did Twitter Become a “Virus of the Mind”?

A libertarian law professor reflects on the poisonous atmosphere and proposed remedies

Using engineering terminology, he makes the point that, whereas the blogosphere has been a loosely coupled system where craziness in one venue had little impact on another, new social media are tightly coupled systems, prone to maximal disruption

Read More ›
audience-crowd-fans-93490

5: AI Can Fight Hate Speech!

AI can carry out its programmers’ biases and that’s all
Putting these kinds of decisions in the hands of software programs is not likely to promote vigorous and healthy debate. Read More ›
joanjo-pavon-563960-unsplash
Series of drawn human faces

No, Twitter Is Not the New Awful

It’s the Old Awful back for more. It’s the Town Without Pity we all tried to get away from
We need to decide: Is Twitter the telephone company (a communications platform), the newspaper (a publisher), or interconnected private gossip klatsches where anyone can say whatever they want, whatever ensues? Read More ›
craig-sybert-774140-unsplash
Retro robots

Does Democracy Demand a War on Twitterbots?

A key concern is that citizens could be induced to vote for a demagogue by Twitterbots spreading fake news.
Underlying much of the angst about the political impact of bots is a basic premise: Most of us need help thinking for ourselves and protection from the many bad influences that we are not able to recognize, the way our betters can. Read More ›
bird-peak-animal-graffiti-owl-painting-1070252-pxhere.com

Twitter doesn’t just seem out of control

It actually is.
Social media may be changing the world more than we think. And we may need some social leadership in fighting back against Twitter mobs. It probably won’t emerge from within because bullies are usually cowards. Read More ›
Two Retro Tin Robot on a White Background

The New Politically Correct Chatbot Was Worse?

If you are a human being who talks to people for a living, don’t quit your job
Within 16 hours, the Microsoft team had to shut down their chatbot Tay. With assistance from so many online sources, Tay’s ability to be nasty exceeded that of any individual human. And as for her replacement, Zo, who would never repeat those mistakes… Read More ›
Phrenology Head Busts

Big Question: Can Big Data Read the Minds of Others?

And should Facebook scan your posts for suicidal thoughts? (It does.)

 Neurologist Robert Burton reflects at Aeon on the fact that mind reading does not really work. Most fashionable theories of mind, like the mirror neuron theory, have not really been much use: This is not to say that we have no idea of what goes on in another’s mind. The brain is a superb pattern-recogniser; we routinely correctly anticipate that others will feel grief at a funeral, joy at a child’s first birthday party, and anger when cut off on the freeway. We are right often enough to trust our belief that others generally will feel as we do. More. True, but the problem isn’t with recognizing what most people probably think; it’s with recognizing unusual but important patterns. How…