Critics of ‘Sexist Algorithms’ Mistake Symptoms for Illness | Real Clear Technology

Critics of ‘Sexist Algorithms’ Mistake Symptoms for Illness; Amber Laxton, Daniel Castro; In Some Blog entitled Real Clear Technology; 2015-07-30.

Amber Laxton, graduate research fellow, Information Technology and Innovation Foundation
Daniel Castro, vice president, Information Technology and Innovation Foundation.

tl;dr → the CMU study is Rong, nothing to see therein, society is to blame anyway.

Original Sources

Amit Datta, Michael Carl Tschantz, Anupam Datta; Automated Experiments in Ad Privacy Settings: A Tale of Opacity, Choice and Discrimination; In Proceedings of Privacy Enhancing Technologies Symposium (PETS);  2015-04-01; landing; separately noted.


Critical BIND bug CVE-2015-5477 scores PATCH YESTERDAY grading | The Register

Critical BIND bug scores PATCH YESTERDAY gradingDarren Pauli; In The Register; 2015-07-30.
Teaser: Easy to hack universal remote BIND DoS hole leaves DNS open to attack


  • About CVE-2015-5477; Michael McNally (Internet Systems Consortium); In Their Blog; 2015-07-28.
    tl;dr → yes, this is real.
  • CVE-2015-5477An error in handling TKEY queries can cause named ot exit with a REQUIRE assertion failure
  • Remediations
    • BIND 9 version 9.9.7-P2
    • BIND 9 version 9.10.2-P3.
  • Quoted
    • Michael McNally, press relations, Internet Systems Consortium
    • Ty Miller, founder, Threat Intelligence

Digital Advertising’s Blind Spot | ANA Magazine

Digital Advertising’s Blind Spot; Andrew Eitelbach; In ANA Magazine; 2015-07; 1 page.


Ad Block Plus


Placed Builds Out Attribution Platform, Connecting Store Visits to Dollars Spent | Street fight

Placed Builds Out Attribution Platform, Connecting Store Visits to Dollars Spent; ; In Street Fight; 2015-07-29.


  • Placed
    • Seattle
    • David Shim, CEO.
  • xAd
  • Trade Names
    • Purchase Rate Index
    • Placed Points
    • Placed Revenue
  • Scheme
    • Outboard
      • Purchase Rate Index
    • Inboard  (data production)
      • a loyalty program, a survey program
      • An opt-in panel study
      • Interrogatories delivered via Push Notifications.
      • <quote>Placed Revenue asks mobile users, whose mobile device’s location data reveals that they physically visited that store, whether they bought anything at the store, and if so how much they spent. It achieves this through a push notification survey.</quote>
      • <quote>[Consumers] can earn extra Placed Points by [participating].</quote>
  • Participants
    • 5 Below
    • 99 Cents Store
    • AutoZone
    • BJ’s Wholesale Club
    • CVS
    • Costco
    • Dollar General
    • Dollar Tree
    • Family Dollar
    • Hobby Lobby
    • Meijer
    • Menard’s
    • Michael’s
    • PetSmart
    • Rite Aid
    • Sam’s Club
    • Target
    • Tractor Supply Co
    • Walgreen’s
    • Walmart

Using Algorithms to Determine Character | NYT

Using Algorithms to Determine Character; Quentin Hardy; In The New York Times (NYT); 2015-07-28.


  • Upstart
    • Palo Alto, CA
    • Paul Gu
      • founder
      • Yale dropout
    • lending
    • credit scoring, propensity scoring
    • student credit rating based on GPA & SAT
  • ZestFinance
    • writes loans
      • to subprime borrowers
      • (new) “near prime” borrowers
        who have either fallen from the prime category or risen from subprime.
    • Douglas Merrill
      • the founder and chief executive
      • ex-Google
  • Definition of Character
    unspecified, but a propensity in a context; i.e. of quitting a job, repaying a loan.
  • Workday
    • personnel software via SaaS
    • a product
      • predicts, quitting
      • suggests remediations
      • Based upon:
        • 45 employee performance factors
        • how long a person has held a position
        • how well the person has done.
  • Jure Leskovec
    • a professor, computer science, Stanford,
    • a study on bail heaqring bias (behavior of judges)

New Breed of Digital Publishers Just Say No to Ad Tech | WSJ

New Breed of Digital Publishers Just Say No to Ad Tech; Mike Shields; In The Wall Street Journal  (WSJ); 2015-07-28.


  • <quote>advertisers have been drawn to this new breed of social-centric, millennial-focus set of sites. For the time being, many are treating this category as distinct from the automated, data-driven, ad tech world.</quote>
  • Contrarians opine late in the piece that programmatic is here to stay, the “new ones” variously have
    • too much venture money
    • have not faced tough markets
    • inability to scale, haven’t reached that stage yet
    • focus on editorial, internal focus via analytics


For color, background & verisimilitude…

  • Scott Grimes, chief executive, Woven Digital.
  • Chris Altchek, chief executive,
  • Ed Montes, chief revenue officer, DataXu.
  • Seth Rogin, chief revenue officer, Mashable,
  • Susan Bidel, staff, Forrester Research.
  • Eric Franchi, co-founder, Undertone.
  • Gian LaVecchia, managing partner, MEC.


  • BuzzFeed
  • Mic (
  • Outbrain, a chumbucketer
  • Taboola, a chumbucketer
  • Refinery29
  • Undertone, an ad network.
  • Vox Media
  • Woven Digital
    • Uproxx, a site
    • Scott Grimes, chief executive, Woven Digital


Roughly in order of appearance


Using HTML5 to Prevent Detection of Drive-by-Download Web Malware | De Santis, De Maio, Petrillo

Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo; Using HTML5 to Prevent Detection of Drive-by-Download Web Malware;; In Security and Communication Networks, Volume 8, Issue 7, 2015-04-10, pages 1237-1255; arXiv:1507.03467.


The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications. The results are web applications that look and feel almost like desktop applications while retaining the advantages of being originated from the web. However, these advancements come at a price. The same technologies used to build responsive, pleasant and fully-featured web applications, can also be used to write web malware able to escape detection systems. In this article we present new obfuscation techniques, based on some of the features of the upcoming HTML5 standard, which can be used to deceive malware detection systems. The proposed techniques have been experimented on a reference set of obfuscated malware. Our results show that the malware rewritten using our obfuscation techniques go undetected while being analyzed by a large number of detection systems. The same detection systems were able to correctly identify the same malware in its original unobfuscated form. We also provide some hints about how the existing malware detection systems can be modified in order to cope with these new techniques.