Man who tokenized himself on Ethereum becomes AI deepfake
> Ethereum’s tokenized man just became a synthetic deepfake—and you can decide what he says for $99.
> Cognitive scientists have identified a number of common ways in which people avoid being gullible. But con artists are especially skillful at what social scientists call framing, telling stories in ways that appeal to the biases, beliefs and prominent desires of their targets. They use strategies that take advantage of human weaknesses.
Good collection of cons.
Cross post: https://theconversation.com/why-do-people-believe-con-artists-130361
Dressing for the Surveillance Age
> As cities become ever more packed with cameras that always see, public anonymity could disappear. Can stealth streetwear evade electronic eyes?
I liked this article because it at least acknowledged that these countermeasures are only a training data update away from becoming useless.
> In this paper I present an analysis of 1,976 unsolicited answers received from the targets of a malicious email campaign, who were mostly unaware that they were not contacting the real sender of the malicious messages. I received the messages because the spammers, whom I had described previously on my blog, decided to take revenge by putting my email address in the ‘reply-to’ field of a malicious email campaign. Many of the victims were unaware that the message they had received was fake and contained malware. Some even asked me to resend the malware as it had been blocked by their anti-virus product. I have read those 1,976 messages, analysed and classified victims’ answers, and present them here. The key takeaway is that we need to train users, but at the same time we should not count on them to react properly to Internet threats. Despite dealing with cybercrime victims daily for the last seven years I was surprised by most of the reactions and realized how little we, as the security industry, know about the average Internet user’s ability (or rather inability) to identify threats online. We need to build solutions that will protect users, without their knowledge, sometimes against their will, from their ability to harm themselves.
> The fifth group is actually the most worrying. I call this group ‘MY ANTI-VIRUS WORKED, PLEASE SEND AGAIN’, as these are recipients who mention that their security product (mostly anti-virus) warned them against an infected file, but they wanted the file to be resent because they could not open it. The group consisted of 44 individuals (2.35%).
The 1918 Parade That Spread Death in Philadelphia
> The influenza pandemic of 1918-19 killed between 50 and 100 million people around the world, more than died in the battles of World War I. In the United States, the hardest-hit city was Philadelphia, where the spread of the disease was spurred by what was meant to be a joyous event: a parade.
The Case of the Missing Hit
> A man in California is haunted by the memory of a pop song from his youth. He can remember the lyrics and the melody. But the song itself has vanished, completely scrubbed from the internet. PJ takes on the Super Tech Support case.
Desperate for High-Paying Wall Street Jobs, Penn Students Try Buying Their Way Into the Right Classes
> Five years ago, sophomores like Current might not have been so desperate. Back then, finance companies hired for their all-important junior-year summer internships just a few months ahead of time. But recently, in an attempt to scoop up the best students before anyone else, companies have moved up the timeline. It’s now standard practice for finance firms to recruit sophomores like Current — who has only completed three semesters of college and hasn’t even declared a major — for those same junior-year summer internships a full 18 months in advance.
What is a 'Weenus' ('Wenis,' 'Weenis')?
> The loose skin at the joint of one’s elbow
In Carlos Ghosn’s Escape, Plotters Exploited an Airport Security Hole
My Semester With the Snowflakes
> At 52, I was accepted to Yale as a freshman. The students I met there surprised me.
Add a little Canada to your website
> hockey player checks out lumberjack while woman in Canadian tuxedo looks on in disbelief
How the scourge of cheating is changing speedrunning
> How do you catch fakes when it’s easier than ever to manipulate video?
Welcome to the age of the avatar
In the modern commune, a case of beer is not welcome
> didn’t plan to move into a commune. But when The Economist sent me to San Francisco for two months to cover a gap in our Silicon Valley coverage, my housing options seemed unpalatable. I didn’t want to live in a soulless serviced apartment, and hotels and Airbnbs were horrifically expensive for long stays. So I found myself trawling Facebook groups with names like “San Francisco flatshare”. A stranger suggested I look at a spare room in a communal house he knew. I wrote an earnest email introducing myself to its occupants and asking whether they had a room for a month. A few hours later I was in.
> I felt like a Neanderthal, supping beer and interjecting to add that surely it was important to enjoy yourself now and again. This sat oddly with a group that was on a different path towards self-actualisation.
Imagine Being on Trial. With Exonerating Evidence Trapped on Your Phone.
> Public defenders lack access to gadgets and software that could keep their clients out of jail.
> This tech gap has two basic forms. First, law enforcement agencies can use warrants and court orders to compel companies to turn over emails, photos and other communications, but defense lawyers have no such power. And second, the government has access to forensic technology that makes digital investigations easier. Over the last two decades, the machines and software designed to extract data from computers and smartphones were primarily made for and sold to law enforcement.
> To successfully defend its clients, the Legal Aid Society, New York City’s largest public defender office, realized in 2013 that it needed to buy the same tools the police had: forensic devices and software from companies including Cellebrite, Magnet Forensics and Guidance Software. Not only does the expensive technology unearth digital evidence that is otherwise hard or impossible to find, it captures it in a format that can hold up in court, as opposed to evidence that could have been tampered with or forged.
Zombie Miles And Napa Weekends: How A Week With Chauffeurs Showed The Major Flaw In Our Self-Driving Car Future
> A few years ago, Mustapha Harb realized there was a problem in his field of research about how autonomous cars will change the way people travel. The solution to the problem he settled on was as simple as it was revealing.
> Using 13 volunteers (a very small sample size due to budgetary constraints) from the San Francisco Bay Area who owned cars, Harb and his team studied their travel patterns using GPS trackers on their cars and phones for one week, then gave them a chauffeur for a week who would drive the participants’ personal vehicles for them. Finally, the researchers observed the subjects for a final week to look for any changes returning to their chauffeur-less life.
On the Internet, No One Knows You’re Not Rich. Except This Account.
> In February, an Instagram account called @BallerBusters cropped up and began wreaking havoc on the flashy Instagram entrepreneur community.
> Its goal: To expose phony entrepreneurs. Using a mix of screen-shotted receipts, memes and crowdsourced information from followers, the account seeks out people who don’t “act their wage.”
A sport of their own
> A high school wrestler from Kansas spent four years fighting to give girls the opportunity to compete in an official state sport.
The Flyers created a 'rage room' where angry fans can smash TVs
> The Flyers made a run to the Stanley Cup Finals nearly a decade ago, but the team hasn’t made it out of the first round since 2012, and the team finished 16 points out of a playoff spot last season. For those fans who can’t deal with the prospect of finishing behind the Penguins in the Metropolitan division, the team has opened what it calls a “Disassembly Room,” where fans can pay to expel their rage by smashing a TV with a sledgehammer.
The 3 A.M. Phone Call
> It went to a national security adviser, Zbigniew Brzezinski, who was awakened on 9 November 1979, to be told that the North American Aerospace Defense Command (NORAD), the combined U.S.–Canada military command–was reporting a Soviet missile attack. Just before Brzezinski was about to call President Carter, the NORAD warning turned out to be a false alarm. It was one of those moments in Cold War history when top officials believed they were facing the ultimate threat. The apparent cause? The routine testing of an overworked computer system.