Curiosity gap about AdTech, you won’t believe what happens next!

; Things you should know about AdTech, today; In His Blog, centrally hosted on LinkedIn; 2017-08-30; regwalled.

Occasion

Boosterism in front of the trade shows
  • Exchange Wire #ATSL17
  • Dmexco
  • Programmatic IO

Separately noted.

Social media intelligence and profiling in the insurance industry… | Privacy International

Tom Fisher (Privacy International); Social media intelligence and profiling in the insurance industry…; In Their Blog, centrally hosted on Medium; 2017-04-24.
Tom Fisher is Dr. Tom Fisher, staff, Privacy International.

tl;dr → VisualDNA, Big Data Scoring (BDS) provide personality profiling & scoring.

Mentions

  • Admiral Insurance
  • FirstCarQuote, a product of Admiral Insurance
  • Personality Profiling
  • Social Media Intelligence
    defined as <quote>to make predictions and decisions about people.</quote>
  • Personality estimation, via Facebook “data”
  • 2016-11
  • Facebook Platform Policy
    as necessary, to cessate ensmallen these embarassments.
  • Big Data Scoring
  • VisualDNA
  • Some Query from compare.php; At Some Site, perhaps doing business as (dba) Paranoid Paul
  • First Car Quote
    • has a mandatory Facebook sign in
    • relaunched
      • with a mandatory “login via Facebook”
      • analysis of Facebook posts
      • “voluntary” personality quiz
  • ZestFinance, team
[Facebook] Account Information
  • name
  • email address
  • gender
  • birth date
  • current city
  • profile picture
VisualDNA
  • sells personality profiling
  • for credit scoring
  • purveying to lenders.
  • <quote>patented and unique psychometric tests to credit assessment</quote>
  • Credit and Risk
  • Concept
    • “thin-file” subjects.
    • assist with credit scoring.
    • Axes
      • “openness”
      • “neuroticism”
      • “emotional stability”
      • [what happened to] “conscientiousness”
Features
  • coulddo suggest overconfidence
    • sentence length
    • use of exclamation marks
    • words like “always” or “never” (as opposed to “maybe”)
  • a measure of organization (conscientiousness)
    • arranging to make appointments at a specific time, rather than a generic “this evening”

Big Data Scoring (BDS)

  • Erki Kert, CEO and co-founder.
  • a credit scoring services
  • sells to Admiral
  • commencing 2016-03
Digital Footprint DATA
  • original product
  • a loan default propensity score
  • offered 2013–04
  • based on Facebook “data”
    • profile data
    • status updates
    • likes
    • locations
  • <quote>5,000–10,000 lines of data for each client</quote>, sourced from page.

Other Schemes

  • China → “social credit score,” a total awareness scheme.
  • India → some lender, using Twitter posts on politics.

Who

  • Yossi Borenstein, “head” of risk analtycs, VisualDNA
  • Erki Kert, CEO and co-founder, Big Data Scoring (BDS).
  • Douglas Merrill, CEO, ZestFinance; ex- Chief Information Officer (CIO), Google

Referenced

Merchandising

Press

Veillance Integrity by Design: A new mantra for CE devices and services | Steve Mann, IEEE CE

Steve Mann; Veillance Integrity by Design: A new mantra for CE devices and services. [Soapbox]; In IEEE Consumer Electronics Magazine, Volume 5, Issue: 1; 2016-01 (2015-12-14); 8 pages; DOI:10.1109/MCE.2015.2484879; landing, pdf.
Steve Mann is Steve Mann. He is also General Chair of the IEEE International Symposium on Technology and Society,[8] Associate Editor of IEEE Technology and Society, is a licensed Professional Engineer, and Senior Member of the IEEE.[9]

Abstract

The purpose of the Veillance Foundation is to bring together people interested in the decriminalization of truthfulness, honesty, integrity, health and safety, privacy, remembrance, humanistic intelligence, and scientific understanding of our world, both natural and human-made. Our goal is to develop technologies and business practices around basic principles of honesty, integrity, health and safety, privacy, remembrance, humanistic intelligence, and open-scientific discourse.

Mentions

References

Phones Move – and So Should the Law | Lawfare

Susan Landau; Phones Move – and So Should the Law; In Some Blog, entitled Lawfare; 2017-08-16.

tl;dr →A warrant is needed to access the CSLI

because
  1. The network records the device’s location, always.
  2. Consumers do not comprehend this.
  3. Automation makes voluminous detail insightful and transparent.
Occasion

Amicus Brief; Timothy Ivory Carpenter v. United States; No. 16-402.

Mentions

  • Cell Site Location Information (CSLI)

Referenced

INRIA Privatics tries to uncover how websites can dig into your preferences online

tl;dr → like panopticlick, but different.
Original Sources

Mentions

Who

Referenced

Nearby Connections 2.0: fully offline, high bandwidth peer to peer device communication | Android Developers

Announcing Nearby Connections 2.0: fully offline, high bandwidth peer to peer device communication; Ritesh Nayak M; Android Developers; 2017-07-31.
Ritesh Nayak M, Product Manager, GoogleAlphabetGoogleAndroidThatTheyThem (Whatever it is they call themselves these days in the Android Division).

Mentions

  • As foretoldpromised at Google I/O 2017.
  • Google Play Services 11.0 and up
  • Nearby Connections uses
    • WiFi
    • Bluetooth LE
    • Classic Bluetooth

Concept

  • Offline mode (no need to contact Google’s mothership
    <snide>I’ll believe it when I see it</snide>
  • Fully Peer-to-Peer.
  • Switches among radio devices when possible.

Semantics

  • “Socket-like” connection semantics of ordered, guaranteed-delivered byte streams.
  • Topology
    •  Star: → 1:N topologies
    • Cluster → M:N topologies

Promotions

Intel ME controller chip has secret kill switch | The Register

Intel ME controller chip has secret kill switch; Thomas Claburn; In The Register; 2017-08-29.
Teaser: Researchers find undocumented accommodation for government customers

tl;dr → undocumented configuration setting that disables Intel Management Engine 11.
and → set the (undocumented) HAP bit to 1 in a configuration file.

Original Sources

Dmitry Sklyarov, Mark Ermolov, Maxim Goryachy (Positive Technologies), Disabling Intel ME; In Their Blog; 2017-08-28.
tl;dr → set the (undocumented) HAP bit to 1 in a configuration file.

Mentions

  • Positive Technologies
    • Moscow
    • Staff
      • Dmitry Sklyarov,
      • Mark Ermolov,
      • Maxim Goryachy
  • Products
    • Intel Management Engine (ME)
    • Intel Management Engine 11
    • Platform Controller Hub
    • Intel Active Management Technology
    • High Assurance Platform (HAP)
    • Intel Boot Guard, wiki tutorial, hosted at corna/me_cleaner
  • Government (U.S)
    • High Assurance Platform (HAP)
    • National Security Agency (NSA)
  • When compromised, it is a backdoor, giving anyone control over the affected device.
  • Intel’s ME consists of a microcontroller that works with the Platform Controller Hub
  • Intel Active Management Technology, a firmware application that runs on the Intel ME.
  • CVE-2017-5689
  • Electronic Frontier Foundation (EFF)
    called it a security hazard, 2017-05.
  • ME Cleaner
    • centrally hosted at GitHub
    • is unofficial
    • but a workaround
    • only partially hobbles the feature
  • , Intel’s boot process verification system, remains unknown, though it hopes to answer that question soon.

Referenced

The State of OA: A large-scale analysis of the prevalence and impact of Open Access articles | PeerJ

Piwowar H, Priem J, Larivière V, Alperin JP, Matthias L, Norlander B, Farley A, West J, Haustein S. (2017) The State of OA: A large-scale analysis of the prevalence and impact of Open Access articles. PeerJ Preprints 5:e3119v1 DOI:10.7287/peerj.preprints.3119v1

Abstract

Despite growing interest in Open Access (OA) to scholarly literature, there is an unmet need for large-scale, up-to-date, and reproducible studies assessing the prevalence and characteristics of OA. We address this need using oaDOI, an open online service that determines OA status for 67 million articles.

We use three samples, each of 100,000 articles, to investigate OA in three populations: 1) all journal articles assigned a Crossref DOI, 2) recent journal articles indexed in Web of Science, and 3) articles viewed by users of Unpaywall, an open-source browser extension that lets users find OA articles using oaDOI.

We estimate that at least 28% of the scholarly literature is OA (19M in total) and that this proportion is growing, driven particularly by growth in Gold and Hybrid. The most recent year analyzed (2015) also has the highest percentage of OA (45%). Because of this growth, and the fact that readers disproportionately access newer articles, we find that Unpaywall users encounter OA quite frequently: 47% of articles they view are OA. Notably, the most common mechanism for OA is not Gold, Green, or Hybrid OA, but rather an under-discussed category we dub Bronze: articles made free-to-read on the publisher website, without an explicit Open license.

We also examine the citation impact of OA articles, corroborating the so-called open-access citation advantage: accounting for age and discipline, OA articles receive 18% more citations than average, an effect driven primarily by Green and Hybrid OA. We encourage further research using the free oaDOI service, as a way to inform OA policy and practice.

Authors

Mentions

CovertBand: Activity Information Leakage using Music

Covertband: Activity Information Leakage using Music; promotional site; University of Washington.

Publication

Rajalakshmi Nandakumar, Alex Takakuwa, Tadayoshi Kohno, Shyamnath Gollakota; CovertBand: Activity Information Leakage using Music; In Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies(IMWUT’17); 2017.

Abstract

This paper contributes a novel method for low-cost, covert physical sensing and, by doing so, surfaces new privacy threats. We demonstrate how a smartphone and portable speaker playing music with embedded, inaudible signals can track multiple individuals’ locations and activities both within a room and through barriers in 2D space. We achieve this by transforming a smartphone into an active sonar system that emits a combination of a sonar pulse and music and listens to the reflections off of humans in the environment. Our implementation, CovertBand, monitors minute changes to these reflections to track multiple people concurrently and to recognize different types of motion, leaking information about where people are in addition to what they may be doing. We evaluated CovertBand by running experiments in five homes in the Seattle area, showing that we can localize both single and multiple individuals through barriers. These tests show CovertBand can track walking subjects with a mean tracking error of 18 cm and subjects moving at a fixed position with an accuracy of 8 cm at up to 6 m in line-of-sight and 3 m through barriers. We test a variety of rhythmic motions such as pumping arms, jumping, and supine pelvic tilts in through-wall scenarios and show that they produce discernibly different spectrograms from walking in the acoustic reflections. In tests with 33 subjects, we also show that even in ideal scenarios, listeners were unlikely to detect a CovertBand attack.