Étiquette : vulnerability (Page 1 of 29)

Telegram is crawling with antisemitism

“Telegram has been unresponsive to Hope Not Hate’s flagging of extremist antisemitic channels and accounts. Hermansson says that the organisation has reached out to the platform with a list of the worst-offending channels advocating for terror. “And they’re still up there. The ones that have disappeared have disappeared of their own accord,” he says. “Not because of Telegram.” That is dangerous, he says, because the impact of these channels can very easily bleed into the offline world. The British fascist group Patriotic Alternative has established a significant presence on Telegram, while the transnational neo-Nazi outfit AtomWaffen Division, which has been linked to at least 11 murders worldwide, has also managed to expand its reach thanks to the platform. “It’s not just kind of a fluffy ideology we are talking about,” says Hermansson. “It’s actual terror propaganda.””

Source : Telegram is crawling with antisemitism | WIRED UK

L’histoire de l’entreprise taïwanaise TSMC est celle de la mondialisation… et de ses limites

Devant l’usine Taiwan Semiconductor Manufacturing Company (TSMC) à Tainan, Taiwan, le 18 septembre 2020.

“Les tensions s’accumulent et devraient pousser les entreprises occidentales à vouloir augmenter leurs capacités de production pour réduire les risques d’approvisionnement. » Les tensions s’accumulent d’autant plus que Pékin a été placé dans une situation intenable par Washington. En interdisant à TSMC de vendre ses puces dernier cri au champion chinois du téléphone, Huawei, l’administration américaine a donné un coup d’arrêt à toute la chaîne de l’électronique chinoise, fer de lance de sa conquête mondiale. Privé de ces puces pour ses smartphones, Huawei a été éjecté violemment de cet immense marché. Car les producteurs locaux sont encore très loin en matière de technologie.La Chine importe aujourd’hui pour plus de 370 milliards de dollars de puces par an, davantage que de pétrole !”

Source : L’histoire de l’entreprise taïwanaise TSMC est celle de la mondialisation… et de ses limites

The Facebook Files – WSJ

The Facebook Files

Facebook knows, in acute detail, that its platforms are riddled with flaws that cause harm, often in ways only the company fully understands. That is the central finding of a Wall Street Journal series, based on a review of internal Facebook documents, including research reports, online employee discussions and drafts of presentations to senior management.
Time and again, the documents show, Facebook’s researchers have identified the platform’s ill effects. Time and again, despite congressional hearings, its own pledges and numerous media exposés, the company didn’t fix them. The documents offer perhaps the clearest picture thus far of how broadly Facebook’s problems are known inside the company, up to the chief executive himself.

  1. Facebook Says Its Rules Apply to All. Company Documents Reveal a Secret Elite That’s Exempt
  2. Facebook Knows Instagram Is Toxic for Many Teen Girls, Company Documents Show
  3. Facebook Tried to Make Its Platform a Healthier Place. It Got Angrier Instead.
  4. Facebook Employees Flag Drug Cartels and Human Traffickers. The Company’s Response Is Weak, Documents Show.
  5. How Facebook Hobbled Mark Zuckerberg’s Bid to Get America Vaccinated
  6. Facebook’s Effort to Attract Preteens Goes Beyond Instagram Kids, Documents Show
  7. Facebook’s Documents About Instagram and Teens, Published
  8. Is Sheryl Sandberg’s Power Shrinking? Ten Years of Facebook Data Offers Clues
  9. The Facebook Whistleblower, Frances Haugen, Says She Wants to Fix the Company, Not Harm It

Source : The Facebook Files – WSJ

More details about the October 4 outage – Facebook Engineering

More details about the Oct. 4 Facebook outage

“One of the jobs performed by our smaller facilities is to respond to DNS queries. DNS is the address book of the internet, enabling the simple web names we type into browsers to be translated into specific server IP addresses. Those translation queries are answered by our authoritative name servers that occupy well known IP addresses themselves, which in turn are advertised to the rest of the internet via another protocol called the border gateway protocol (BGP).
To ensure reliable operation, our DNS servers disable those BGP advertisements if they themselves can not speak to our data centers, since this is an indication of an unhealthy network connection. In the recent outage the entire backbone was removed from operation, making these locations declare themselves unhealthy and withdraw those BGP advertisements. The end result was that our DNS servers became unreachable even though they were still operational. This made it impossible for the rest of the internet to find our servers.
All of this happened very fast. And as our engineers worked to figure out what was happening and why, they faced two large obstacles: first, it was not possible to access our data centers through our normal means because their networks were down, and second, the total loss of DNS broke many of the internal tools we’d normally use to investigate and resolve outages like this.”

Source : More details about the October 4 outage – Facebook Engineering

Ces Afghans qui effacent leurs traces numériques par crainte des talibans

Des talibans contrôlent des conducteurs dans le centre de Kaboul, en Afghanistan, le 15 septembre 2021.

“Lorsque Kaboul est tombée aux mains des talibans, le 15 août, Nilofar Ayoubi a créé, avec ses amies militantes des droits humains, un groupe WhatsApp sur lequel elles échangeaient les dernières informations. « C’est sur ce groupe que j’ai découvert le dispositif mis en place par Facebook pour les Afghans. Je l’ai donc utilisé pour verrouiller mon compte Facebook. J’ai aussi changé la photo et le nom de mes comptes Instagram et Twitter, tout en les rendant privés », explique cette entrepreneuse afghane. Figure de l’opposition aux talibans, cette mère de trois enfants vit aujourd’hui en exil en Pologne.”

Source : Ces Afghans qui effacent leurs traces numériques par crainte des talibans

Delays Aren’t Good Enough—Apple Must Abandon Its Surveillance Plans | Electronic Frontier Foundation

apple with an eye in the center

“The features Apple announced a month ago, intending to help protect children, would create an infrastructure that is all too easy to redirect to greater surveillance and censorship. These features would create an enormous danger to iPhone users’ privacy and security, offering authoritarian governments a new mass surveillance system to spy on citizens. They also put already vulnerable kids at risk, especially LGBTQ youth, and create serious potential for danger to children in abusive households. The responses to Apple’s plans have been damning: over 90 organizations across the globe have urged the company not to implement them, for fear that they would lead to the censoring of protected speech, threaten the privacy and security of people around the world, and have disastrous consequences for many children.”

Source : Delays Aren’t Good Enough—Apple Must Abandon Its Surveillance Plans | Electronic Frontier Foundation

Une action en justice pourrait bloquer l’accès aux plus importants sites pornographiques

Un panneau Pornhub à Las Vegas, Nevada, en 2017.

“Dans les faits, il est en réalité souvent compliqué pour la justice de remonter jusqu’aux propriétaires des grands sites pornographiques, qui s’abritent derrière des cascades de sociétés domiciliées dans plusieurs pays. MindGeek, l’entreprise leader du secteur – elle possède Pornhub, RedTube ou encore YouPorn, pour un chiffre d’affaires qui se compte en centaines de millions de dollars –, a ses bureaux au Canada, mais est fiscalement domiciliée au Luxembourg et possède des dizaines de filiales dans une demi-douzaine de pays. Les associations, en coordination avec la chancellerie, ont donc changé d’angle d’attaque : plutôt que les sites, elles ont ciblé les fournisseurs d’accès Internet (FAI), présents sur le territoire, Orange, SFR, Free, Bouygues… « Nous assignons les FAI en référé car il n’est pas toujours possible d’identifier les éditeurs de contenus pornographiques », reconnaît Me Laurent Bayon, le conseil des deux associations, qui espère que le ministère public appuiera leur demande.”

Source : Une action en justice pourrait bloquer l’accès aux plus importants sites pornographiques

“We’ve enhanced Android’s auto-rotate feature with face detection, using the front-facing camera to more accurately recognize when to rotate the screen. This is especially helpful for people who are using their devices while lying down on a couch or in bed, for example. For developers, this means that the auto-rotation behavior will provide a better user experience for users who have opted in through Settings. The enhanced auto-rotate feature lives within our recently announced Private Compute Core, so images are never stored or sent off the device. In Beta 3 this feature is available on Pixel 4 and later Pixel devices.To make screen rotation as speedy as possible on all devices, we’ve also optimized the animation and redrawing and added an ML-driven gesture-detection algorithm. As a result, the latency for the base auto-rotate feature has been reduced by 25%, and the benefits of the face detection enhancement build on top of those improvements. Give the auto-rotate improvements a try and let us know what yo”

Source : Android Developers Blog: Android 12 Beta 3 and final APIs

Reverse engineering generative models from a single deepfake image

“Deepfakes have become more believable in recent years. In some cases, humans can no longer easily tell some of them apart from genuine images. Although detecting deepfakes remains a compelling challenge, their increasing sophistication opens up more potential lines of inquiry, such as: What happens when deepfakes are produced not just for amusement and awe, but for malicious intent on a grand scale? Today, we — in partnership with Michigan State University (MSU) — are presenting a research method of detecting and attributing deepfakes that relies on reverse engineering from a single AI-generated image to the generative model used to produce it. Our method will facilitate deepfake detection and tracing in real-world settings, where the deepfake image itself is often the only information detectors have to work with.”

Source : Reverse engineering generative models from a single deepfake image

« Older posts

© 2021 no-Flux

Theme by Anders NorenUp ↑