Think about how social networks might improve if—as on the gaming sites and in real life—users had more power to reject abusive behavior. Of course, different online spaces will require different solutions, but the outlines are roughly the same: Involve users in the moderation process, set defaults that create hurdles to abuse, give clearer feedback for people who misbehave, and—above all—create a norm in which harassment simply isn’t tolerated.
Ultimately, online abuse isn’t a technological problem; it’s a social problem that just happens to be powered by technology. The best solutions are going to be those that not only defuse the Internet’s power to amplify abuse but also encourage crucial shifts in social norms, placing bad behavior beyond the pale. When people speak up about online harassment, one of the most common responses is “Well, what did you expect from the Internet?” If we truly want to change our online spaces, the answer from all of us has got to be: more.
Melissa Tobin and I discuss the prediction of crime using twitter data and the role this data could play in police planning, public policy, and public service delivery.
My discussion with @lorenmcginnis on the culture of video games, esports, Twitch.tv, athletics, trolling, and why Microsoft will be introducing a community powered reputation system for Xbox One.
A fantastic article exploring significant security concerns with the Tesla Model S automobile, while also touching upon the need to consider security and privacy with regard to the rise of the Internet of Things.
Given the fantastic future of IoT (Internet of Things) devices ahead of us, it is the responsibility of the security community and device manufacturers to do our best to enable these devices securely. The IoT devices in scope include remotely controllable thermostats, baby monitors, light bulbs, door locks, cars, and many more. The impact of security vulnerabilities targeting such devices can lead be physical in nature in addition to contributing to loss of privacy.
The purpose of this document is to outline the mechanisms by which the Tesla Model S communicates with car owners and the Tesla infrastructure using a variety of TCP/IP mechanisms. The goal of this document is to advise the owners on security issues they should be aware of as well as to kick off a dialogue between security researchers and Tesla Motors that will ultimately drive deeper analysis and assurance.
A steel cable from the iron collar around the condemned man’s neck runs up to a pulley and back down to a spool connected to the back of an old bubblegum machine.
His cell, open to the city’s elements and bustling streets, sits next to the coin-operated spool.
A quarter [dollar] turns [the spool] a quarter [of a] turn. But istead of dispensing bubblegum, it dispenses justice by winding up the wire like a winch.
A half dollar for a half turn. A dollar a turn.
One good turn deserves another, so people line up at the machine to take turns buying turns.
This is the old model. Gallows 2.0, out next quarter, accepts Visa, Mastercard, and Bitcoin, and you can buy forward OR BACKWARD turns (to loosen the noose) while viewing through the cell’s webcam over the Internet.