Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Jonathan Mayer"


3 mentions found


When Elon Musk took over Twitter, he said getting rid of spam bots was a priority. As part of this war on bots, Musk says you'll soon have to pay to DM accounts who don't follow you. Last year, Elon Musk promised "to defeat the spam bots or die trying." The Wall Street Journal reported this week that the level of bot activity on Twitter is about the same as before Musk took over. "As I've said many times, it is increasingly difficult to distinguish between AI bots," Musk added.
Persons: Elon Musk, hasn't, you'll, Musk, Jonathan Mayer, Musk's, I've, Twitter Organizations: Twitter, Street, Princeton University
Apple’s proposal would have downloaded onto every device a secret list of IDs corresponding to known exploitation images. It would then use an algorithm to determine whether any photos on the device were similar to those on the list. Like all matching algorithms, Apple’s system makes educated guesses based on statistical probabilities, but those guesses could be wrong. The second, and greater, problem was that scanning for one type of content opens the doors for scanning for other types of content. Do we want to start allowing the government to require companies to conduct suspicionless, warrantless searches of our messages with family, friends and co-workers?
Persons: Sarah Scheffler, Jonathan Mayer, Apple, Taylor Swift, Apple’s Organizations: Apple, Princeton Locations: India, China, Madison, United States
In addition, encrypted messages may only be sent between two individuals, not groups. Both participants must either have exchanged direct messages in the past, or the recipient of an encrypted message must already follow the sender. Twitter’s former chief information security officer, Lea Kissner, publicly pleaded with Twitter’s current engineering team to improve the feature quickly. And it announced that its goal is to provide a similar level of protection as other privacy-preserving apps that come highly recommended by security experts, such as Signal. The lack of so-called end-to-end encryption makes Twitter’s implementation largely meaningless, security experts said.
Total: 3