Quid AI (YouNoodle) opines upon which start-ups would be successful. You won’t believe what happened next | WEF

a href=”http://amp.weforum.org/agenda/2017/07/computer-ai-machine-learning-predict-the-success-of-startups”>A computer was asked to predict which start-ups would be successful. The results were astonishing; Shashi Reddy; In Their Blog at the World Economic Formm (an LLC?); 2017-07-21.
Shashi Reddy Chief of Staff, Quid AI (ex-YouNoodle).

tl;dr → Quid sells a prediction engine.
Not shown: comparison with the dart board.
Not shown: comparison with the monkeys.

Original Sources

2017 Fifty Best Startups; Ellen Huet (staff); In Bloomberg; 2017-03-06.
Teaser: This is high-ceremony clickbait, an ad for QuidThese Are the 50 Most Promising Startups You’ve Never Heard Of

Listicle
  • Accion Systems
  • Airware
  • Astro
  • AYR
  • BlueLine Grid
  • Clark Germany
  • Cognotion
  • Deako
  • Deep Space Industries
  • Dispelix Oy
  • Distil
  • Doppler Labs
  • Eccrine Systems
  • Edyn (Soil IQ)
  • EyeVerify
  • Focus FS
  • Folloze
  • Geoblink
  • GrayMeta
  • Instamotor
  • Kahuna
  • LEIA
  • Mad Street Den
  • Mapillary
  • Mast Mobile
  • Meta Company
  • Mihup Communications
  • Mobvoi
  • Naritiv
  • Navisens
  • NewStore
  • Notion (Loop Labs)
  • OB1 Company
  • Omada Health
  • Omapal Technologies
  • Paracosm
  • PreNav
  • Quanergy Systems
  • Remind
  • Rulai
  • SafeBreach
  • Shape Security
  • Signifyd
  • SlantRange
  • Soar
  • Socratic
  • Treasure Data
  • Troops
  • Wickr
  • Zodiac

Mentions

  • Quid AI is renamed
    YouNoodle <snide>how dotcommy!</snide>
  • Seems like the funding source was a feature in the model
    <quote>quality of investors</quote>
  • <quote>Quid found these market opportunity areas by analyzing the company descriptions of startups and finding what sectors were most popular among companies founded in 2015 and 2016, plus which sectors raised the most money from the top five venture capital firms. (The list of top venture capital firms comes from a top fund-of-funds that declined to be named for compliance reasons.)</quote>

Who

  • Bob Goodson, CEO, Quid AI.
  • Shashi Reddy Chief of Staff, Quid AI.
  • Ira Sager, reporter, Businessweek

I helped create the Google-Facebook monster — and I’m sorry | Roger McNamee

Image

I helped create the Google-Facebook monster — and I’m sorry; Roger McNamee; an oped; In USA Today; 2017-08-08.
Teaser: ‘Brain hacking’ Internet monopolies menace public health, democracy.
Roger McNamee  is founder, Elevation Partners

Claims

Funded Facebook & Google.

Upon Expertise & Prescience

  • Reminds us of his suchness
  • … as evidenced in his early contribution credit

Concept

  • Now contrite.
  • Has regret
  • Is humble.
  • … on his early contribution as such participation is no longer politic.

Not. Self-Serving.

Sneaky devs could abuse shared libraries to slurp smartphone data | The Register

Sneaky devs could abuse shared libraries to slurp smartphone data; Richard Chirgwin; In The Register; 2017-08-04.
Teaser: Privilege escalation is baked in to mobile OSes, if you look for it

Original Sources

Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic; Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones; 2017-08-11; 17 pages; arXiv:1708.03520

Mentions

  • Intra-Library Collusion (ILC)
  • Combined set of permissions across all instantiations of the library.
  • Privilege Separation

Exploring User Perceptions of Discrimination in Online Targeted Advertising | Plane, Redmiles, Mazurek

Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, University of Maryland; Michael Carl Tschantz, International Computer Science Institute; Exploring User Perceptions of Discrimination in Online Targeted Advertising; In Proceedings of the USENIX Security Symposium; 2017-08-16; some pages; landing.

tl;dr → Consumers hate targeted advertising in concept and in practice. N-2086.

Did someone not know this?  … conclude that this is but awareness raising.

From Internet Farming to Weapons of the Geek | Gabriella Coleman

Gabriella Coleman; From Internet Farming to Weapons of the Geek; In Current Anthropology, Volume 58, Supplement 15; 2017-02; pages S91-S102 (12 pages); DOI:10.1086/688697landing, watermarked pdf copy is marked up with IP address and datetime.

tl;dr → documentation; an inventory of sociocultural forces causing hacker politics; scope to 5 years (2011-2016).

Abstract

Hackers and their projects have become routine, authoritative, and public participants in our daily geopolitical goings-on. There are no obvious, much less given, explanations as to why a socially and economically privileged group of actors, once primarily defined by obscure tinkering and technical exploration, is now so willing to engage in popular media advocacy, traditional policy- and law-making, political tool building, and especially forms of direct action and civil disobedience so risky that scores of hackers are currently in jail or exile for their willingness to expose wrongdoing. Why and how have hackers managed to preserve pockets of autonomy? What historical, cultural, and sociological conditions have facilitated their passage into the political arena, especially in such large numbers? Why do a smaller but still notable fraction risk their privilege with acts of civil disobedience? These are questions that beg for nuanced answers—beyond the blind celebration or denigration offered by popular characterizations of hacker politics. In this article I will provide an introductory inventory—a basic outline of the sociocultural attributes and corollary his- torical conditions—responsible for the intensification of hacker politics during the last 5 years.

Outline

  • Introduction
  • The Craft and Craftiness of Hacking
  • The Autonomous Mind-Set
  • State Intervention as a Political Catalyst
  • The Liberal and Radical Politics of Hacking
  • Conclusion: Weapons of the Geek
  • References

A Privacy Analysis of Cross-device Tracking | Zimmeck, Li, Kim, Bellovin, Jebara

Sebastian Zimmeck, Carnegie Mellon University; Jie S. Li and Hyungtae Kim, unaffiliated; Steven M. Bellovin, Tony Jebara, Columbia University; A Privacy Analysis of Cross-device Tracking; In Proceedings of the USENIX Security Symposium; 2017-08-16; some pages; landing.

Abstract

Online tracking is evolving from browser- and device-tracking to people-tracking. As users are increasingly accessing the Internet from multiple devices this new paradigm of tracking—in most cases for purposes of advertising—is aimed at crossing the boundary between a user’s individual devices and browsers. It establishes a person-centric view of a user across devices and seeks to combine the input from various data sources into an individual and comprehensive user profile. By its very nature such cross-device tracking can principally reveal a complete picture of a person and, thus, become more privacy-invasive than the siloed tracking via HTTP cookies or other traditional and more limited tracking mechanisms. In this study we are exploring cross-device tracking techniques as well as their privacy implications.

Particularly, we demonstrate a method to detect the occurrence of cross-device tracking, and, based on a cross-device tracking dataset that we collected from 126 Internet users, we explore the prevalence of cross-device trackers on mobile and desktop devices. We show that the similarity of IP addresses and Internet history for a user’s devices gives rise to a matching rate of F-1 = 0.91 for connecting a mobile to a desktop device in our dataset. This finding is especially noteworthy in light of the increase in learning power that cross-device companies may achieve by leveraging user data from more than one device. Given these privacy implications of cross-device tracking we also examine compliance with applicable self-regulation for 40 cross-device companies and find that some are not transparent about their practices.

Mentions

Anonymous in Context: The Politics and Power behind the Mask | Gabriella Coleman

Gabriella Coleman; Anonymous in Context: The Politics and Power behind the Mask; Centre for International Governance Innovation (CIGI); Paper No. 3, Series: Internet Governance; 2013-09-23; 17 pages.

CIGI
  • About
  • located in Ontario CA.
  • Jim Balsillie, founder

Abstract

Since 2010, digital direct action, including leaks, hacking and mass protest, has become a regular feature of political life on the Internet. The source, strengths and weakness of this activity are considered in this paper through an in-depth analysis of Anonymous, the protest ensemble that has been adept at magnifying issues, boosting existing — usually oppositional — movements and converting amorphous discontent into a tangible form.  This paper, the third in the Internet Governance Paper Series, examines the intersecting elements that contribute to Anonymous’ contemporary geopolitical power: its ability to land media attention, its bold and recognizable aesthetics, its participatory openness, the misinformation that surrounds it and, in particular, its unpredictability.

Contents

  • About Organized Chaos: Reimagining the Internet Project
  • About the Author
  • Executive Summary
  • Introduction
  • The Formation and Mutations of Anonymous
    • 2005–2010: From Trolling to Irreverent Activism
    • 2010–2012: The Explosion of Digital Direct Action
    • The Logics of Anonymous
  • Weapons of the Geek
  • Conclusion
  • Works Cited
  • About CIGI

Mentions

Later amplified and formalized as

Gabriella Coleman; From Internet Farming to Weapons of the Geek; In Current Anthropology, Volume 58, Supplement 15; 2017-02; pages S91-S102 (12 pages); DOI:10.1086/688697landing, watermarked pdf copy is marked up with IP address and datetime; separately filled.

python-gatt-server benefits as Effortless Standalone BLE Testing for Linux | Medium

Dan Shemesh (Jumper);; Effortless Standalone BLE Testing for Linux; In His Blog, hosted on Medium; 2017-06-28.
Teaser: Using Linux as a BLE peripheral for testing. the source code in this GitHub repo.
Dan Shemesh, Co-Founder and CTO, Jumper.

tl;dr → uses kernel D-bus to make the kernel do the work

Mentions

  • Jumperr-labs/python-gatt-server, at GitHub.
    is summarized as a Python BLE GATT Server (peripheral)
  • Written in Python, obviously.
  • But a wrapper on the core,
  • Did they mention it was written in Python?

Bluez

  • The Linux bluetooth drivers
  • has an HCI socket
  • has a GATT stack

Who

  • Dima Gilburd

Argot

  • D-Bus
  • BLE → Bluetooth Low Energy
  • GATT
  • HCI
  • VM → <ahem>Very Much</ahem>

Referenced

  • ; Bobbin Zachariah; In Lin Oxide; 2014-07-16.
    Commentariat: <quote>This tutorial is so out-dated that dbus_connection_setup_with_g_main is deprecated. New code should use GDBus instead./quote>. Indeed, the code is badly formatted and Might. Work.  See git://git.baker.org/.../bobbin-zachariah-dbus-sample-service.git

The Advent of Netwar | Arquilla, Ronfeldt (1996)

John Arquilla, David Ronfeldt; The Advent Of Netwar; RAND; Document MR-789-OSD
landing; 1996; 127 pages; ISBN/EAN: 0-8330-2414-0; available as pdf fragments at the landing site; Amazon:0833024140: Kindle: $34, paper: $13+SHT.

John Arquilla, David Ronfeldt; The Advent of Netwar (complete copy); National Defense Research Institute;

Abstract

The information revolution is leading to the rise of network forms of organization, with unusual implications for how societies are organized and conflicts are conducted. “Netwar” is an emerging consequence. The term refers to societal conflict and crime, short of war, in which the antagonists are organized more as sprawling “leaderless” networks than as tight-knit hierarchies. Many terrorists, criminals, fundamentalists, and ethno-nationalists are developing netwar capabilities. A new generation of revolutionaries and militant radicals is also emerging, with new doctrines, strategies, and technologies that support their reliance on network forms of organization. Netwar may be the dominant mode of societal conflict in the 21st century. These conclusions are implied by the evolution of societies, according to a framework presented in this RAND study. The emergence of netwar raises the need to rethink strategy and doctrine to conduct counternetwar. Traditional notions of war and low-intensity conflict as a sequential process based on massing, maneuvering, and fighting will likely prove inadequate to cope with nonlinear, swarm-like, information-age conflicts in which societal and military elements are closely intermingled.

Followup

John Arquilla, David Ronfeldt; The Advent of Netwar (Revisited); Document MR1382.ch1; Chapter in Some Larger Volume; WHEN?; 25 pages.

John Arquilla, David Ronfeldt; Osama bin Laden and the Advent of Netwar; In New Perspectives Quarterly (NPQ); 2001; N pages; DOI:10.1111/0893-7850.00436; paywall.

John Arquilla & David Ronfeldt; The Advent of Netwar: Analytic Background; In Studies in Conflict & Terrorism; Volume 22, Issue 3, 1999; pages 193-206; online 2001-09-01, 2010-08-28; DOI:10.1080/105761099265720; paywall.

Revealed: The naughty tricks used by Instart Logic to bypass ad blockers | The Register

Revealed: The naughty tricks used by web ads to bypass blockers; Thomas Claburn (San Francisco); In The Register; 2017-08-11.
Teaser: A behind-the-scenes look at the cat and mouse game played by publishers and devs

tl;dr → the ad blocker blockers and their blocker blocker blockers.

Mentions

History

Ignoring content control affordances

Exemplars

Blocker Blockers

a.k.a. The Enforcers

In alphabetical order

Instart Logic
  • California
  • Behaviors
    • disguises third-party network requests so they appear to be first-party network requests.
    • allows ad services used by website publishers to place cookies and serve ads that would otherwise by blocked by the SOP
    • detects when a browser developer console is open for the purpose of concealing code from the <euphemism>technically inclined</euphemism>
    • detects network analysis tools, cite
      • Wireshark
      • Charles Proxy, of Windows
Facebook

Attempts to block ad block.

PageFair

Purveyor to the trades of block-ad-block advice, products & services.

Sourcepoint

Purveyor to the trades of block-ad-block advice, products & services.

Uponit
  • JavaScipt code that attempts to bypass content blocking
  • <quote>Our JavaScript detects all blocked ad calls, fully recreates them (including targeting) and communicates them to our servers through a secure, undetectable channel that bypasses ad blockers,</quote> An impactful benefits statement.
  • code, as supplied by WHO? Raymond Hill.

Blockers

a.k.a. The Dissidents
uBlock Origin
Brave
  • yes.
Safari

Who

  • Peter Blum, VP product management at Instart Logic
  • Raymond Hill, maintains uBlock Origin
  • Luke Mulks, staff, development, Brave

Referenced

Related