You are viewing a read-only archive of the Blogs.Harvard network. Learn more.

The Longest Now


Elementary creature cards: a funny game of math and logic
Thursday April 20th 2023, 4:02 pm
Filed under: chain-gang,noetic,Seraphic,zyzzlvaria

I’m trying to track down physical creature cards, a logic puzzle that started w/ the Elementary Science Study project (in Newton!) & was riffed on for decades.  The visual and mathematical puzzles became quite involved; including combinations of shading, geometry, topology, number theory, and more.  Creatures were also creatively named: Mokes, Snorpes, Gligs, Wibbles, Shlooms, Bleeps, Quarks, Trugs, Zyzzes, Mellinarks…

If you run across these somewhere, please reach out and get in touch.  I would like to reprint some of the professionally done sequences, and perhaps expand on the idea.

Example (via Amber Case).

Discussion:

Comments Off on Elementary creature cards: a funny game of math and logic


Kostoff, reprised: peer review secured again, everything is fine.
Wednesday May 11th 2022, 10:18 am
Filed under: chain-gang,citation needed,metrics,poetic justice,unfinished draft

In the end, Elsevier retracted Kostoff’s anti-vax article, along with a pro-ivermectin study in the same issue that was similarly statistically-challenged.  (It was that ivermectin study that led me to discover the issue in the first place, via scite.ai)

But not before his article dominated media and social media references to the Journal for months; and the author parlayed his peer-reviewed work into a DailyClout essay that was even more extreme, and did a tour on the social media anti-vax circuit. Thousands of people spent time debunking this nonsense, including a dozen on PubPeer alone.  Millions of people saw references to it on social media.

The editor-in-chief who regularly published his own articles (or added himself as author to articles in his journal) stepped down as EIC, but continues to edit other toxicology journals and publish research at a healthy clip of three articles a month. Global understanding of COVID-19 is advancing steadily, with no further confusion or misdirection whatever. Everything is fine 🐶🔥

 

Comments Off on Kostoff, reprised: peer review secured again, everything is fine.


The Kostoff knowledge: Elsevier fakes peer review of COVID click-bait

The Kostoff knowledge v.14

Updates: Elsevier retraction (5/9), concern (12/17). EIC Tsatsakis removed. (~3/25).
Analyses by Schneider (10/6) & Morris (10/14). Kostoff’s article is top 1% by Altmetric.
K. publishes 3× more extreme version (10/13). Tox.Rep’s CiteScore grows 5% in Oct.
15 of Kostoff’s last 18 papers written w. Tsatsakis, the other 3 in Tsatsakis journals.

Earlier this month, Elsevier‘s Toxicology Reports (CiteScore 6.4, top quintile) published a special issue on the COVID-19 pandemic.  Its includes a remarkable article by Kostoff, et al., claiming that getting a COVID-19 vaccine is, “extremely conservatively“, 5x as likely to kill people over 65 as it is to save them, and even more harmful to younger people. (Kostoff, et al., Tox. Rep. (2020), 7, 1448-1458)

This echoes the fraudulent claims of German homeopath Harald Walach, who briefly published a similar article in MDPI Vaccines in June, before it was promptly retracted.  A few of the most outrageous claims are listed below. None of this is subtle – unbelievable assertions start in the second paragraph of the abstract; the lead author has no past experience in the field; and the article puts “pandemic” and “vaccine” in scare quotes, and makes regular use of bold italics to emphasize points that are exaggerated.

This is why we have peer review, and editors, to distinguish research from polemic. Access to a reliable + competent body of reviewers is, in theory, a primary service that giant publishers like Elsevier offer to editors. Another is their name: being an Elsevier journal means you will be taken seriously out of the gate, and added to the major indices.

We should all be concerned that our publishing model allowed such a deceptive essay to be given the veneer of legitimacy – for weeks now, without correction.  And we must hold both journals and publishers accountable for fraud that they support or legitimize – through deceptive practice, lack of claimed review, or inaction.

I want to come back to this, and discuss ways to remedy this, and some current steps in the right direction.  But first let’s look at this instance in detail – as the errors were the most obvious that I’ve seen, related papers have been retracted in recent months, and it is impossible to imagine even casual peer review missing them.  And because, as we will see, this particular Elsevier journal has been gaming the system for some time.

Article-level fraud (by the authors)

1. Extensive misuse of VAERS data: VAERS is an open public registry of unvetted self-reports of health events occurring after vaccination. Most events are not caused by vaccines, but this is a starting point for further analysis. Doctors are supposed to report any deaths or hospitalizations occurring within a week of vaccination, regardless of potential causal link.

The very openness of this data has led to it being widely cited in anti-vax propaganda, misinterpreting VAERS as a catalog of known harms and side-effects. (“Don’t Fall for VAERS scares“)

(more…)



FSF splits up, dithering til only a Stallman corps remains
Thursday April 01st 2021, 12:34 pm
Filed under: %a la mod,chain-gang,Uncategorized

The FSF, bastion of advocacy for free & open software and the need for copyleft in general, split up last week – dividing its community in a lasting way.

At the end of the 2021 LibrePlanet conference, surprising staff and speakers and attendees, RMS announced he was returning to the Board.

In the immediate aftermath, all of the external conference keynotes, some former FSF trustees, and a number of other free software community leaders, published an open letter calling on the entire FSF Board to resign.

Since then:
* A number of large organizations withdrew their support for the FSF, including Mozilla, RedHat, EFF, and Creative Commons
* A number of GNU and other free software projects have signed the letter, including GCC, GNU Radio, GNU Mailman, X.org, and Tor
* A number of FSF staff gave notice, including the ED, Deputy ED, CTO, and President.
* Their most meticulous board member resigned.
* A member of the FSF staff was appointed to the Board.

Some 3000 people signed the open letter; another 4500 6000 signed a letter in support of Stallman. That split is likely to last, and to define the Foundation as it hires new leadership and looks for new Trustees.

(more…)

Comments Off on FSF splits up, dithering til only a Stallman corps remains


Out with a whimper: the .ORG heist averted, and its aftermath
Saturday May 02nd 2020, 11:27 am
Filed under: chain-gang,international,Not so popular

A quick positive update on the .ORG fire sale: at the end of April, ICANN rejected the proposed sale of .ORG to Ethos Capital. (EFF summary).  That is likely the end of this particular takeover bid, though the registry is still at risk of a reprise while it remains under current management.

Leading up to this:

  • NTEN and allies launched the SaveDotOrg coalition in November, including EFF, Wikimedia, and others. An extended advocacy campaign from many fronts included lawmakers in DC and in California, where ICANN is headquartered.
  • ICANN asked ISOC for additional background information.
  • In January, a new charity (CCOR) was founded to offer a not-for-profit alternative willing to take over .ORG from PIR.
  • California AG Xavier Becerra wrote a critical letter to ICANN about the sale.
  • On April 30, ICANN rejected the sale

Epilogue:
– In June, SaveDotOrg repeated its request to ISOC to implement contract protections for .ORG, to make it less tempting as the object of a future corporate takeover. ISOC declined.
– In July, the Ethos site listed Fadi Chehade as Co-CEO of the fund, after initially not listing him on the site at all.

Comments Off on Out with a whimper: the .ORG heist averted, and its aftermath


Trump’s tee-totalling: why are so many meetings held on the golf course?
Sunday December 01st 2019, 6:17 pm
Filed under: %a la mod,chain-gang,citation needed,fly-by-wire,international

It is time we stop talking about “golf time” as leisure time away from the presidency, and start treating it as a primary channel for meetings, negotiations, and decision-making. (See for instance the last line of this remarkable story.)

Trump’s presidential schedule is full of empty days and golf weekends – roughly two days a week have been spent on his own resorts, throughout his presidency. Combined with his historically light work schedule, averaging under two hours of meetings per day, the majority of small-group meetings may be taking place at his resorts.

He has also directed hundreds of government groups, and countless diplomatic partners and allies, to stay at his resorts and properties.

On his properties, his private staff control the access list, security videos and other records.  They are also able to provide privacy from both press and government representatives that no federal property could match.

How might we address the issues involved with more clarity?

Paying himself with government funds

To start with, this is self-dealing on an astronomical scale: the 300+ days spent at his golf clubs and other properties have cost the US government, by conservative estimate, $110 million. The cost of encouraging the entire government to stay at Trump properties is greater still, if harder to estimate. (more…)

Comments Off on Trump’s tee-totalling: why are so many meetings held on the golf course?


Cancer as dogma / five unrestricted growth hacks sure to bloat your host (DNS Edition)
Friday November 29th 2019, 10:22 pm
Filed under: Aasw,chain-gang,fly-by-wire,Not so popular,unfinished draft

A sidebar, while listening to public arguments in favor of the .org heist by those who would profit from it

1. Primary markers of cancer in organisms:

The progression from normal cells, to cells that can form a detectable mass, to outright cancer, is called malignant progression.

2. 90% margins

Industries with 90% or higher profit margins (often: marginal profit margins, where there was some up-front cost doubling as barrier to entry and hand-waving excuse for continuous rent increases) are all deeply inefficient and non-competitive.  That should be what you (or any economist) would suspect, yet people continue to say things like “I’m not actually against the 95 percent profit margins or even caps if the market for broadband were competitive. Unfortunately

The rise of these industries eat collective surplus and productivity, and funnel the fruits of new technology into the hands of organizations that think this sort of resource allocation is healthy. This gives them ample resources to expand their work, into new markets and topics, and to train new industries to adopt their techniques. 90% margins become 99%, until all available shared resources are captured by this network. In other words: cancer.

Here is the head of ISOC, convincing himself and others that a well-meaning private equity firm will not unreasonably raise rates for use of their namespace monopoly. “Given registries must announce price increases for renewal 6 months in advance, and domains can be registered at current prices for up to 10 years, any operator seeking to increase prices dramatically would certainly lose customers without producing any increased revenue.

This is not so.  Renewal rates are quite price-inelastic (it costs > 100x the annual registration cost to change one’s domain on all sites and materials, and breaks existing links).  Incentivizing people to hurry up and register for 10 years at once would produce a surge of revenue, not a decline.  New domains can have prices raised with no warning, which would simply raise new domain rates for TLDs across the industry: likely bringing in more revenue as well as support from other registries (.org / .net /.com are among the few TLDs that can unilaterally affect industry rates)

(more…)

Comments Off on Cancer as dogma / five unrestricted growth hacks sure to bloat your host (DNS Edition)


ICANN races towards regulatory capture: the great .ORG heist
Saturday November 23rd 2019, 6:13 pm
Filed under: chain-gang,fly-by-wire,international,Not so popular

Updates: EFF letter, PIR’s update; IGP’s insider take; ICANN resolution;
Ways to act, Reg essay x2Ohashi, Tim Berners-Lee response;
Letters from
ISOC(😇), Ethos(🌈), and a banker (🚩🚩📜)
(See also Part 2: How to Flip .org)

Ethos Capital, a new commercial investment firm founded in the past few months in Boston, has 2 staff and only one pending investment: a deal to acquire the 501c3 non-profit that currently runs the .org domain (valued at a few $B), for an undisclosed sum. This was initiated immediately after ICANN decided in May, over almost universal opposition, to remove the price cap on .org registrations with no meaningful price protections for existing or future registrants.

This seems to run afoul of a range of ethical, ICANN, ISOC, and non-profit guidelines.  It is certainly the privatisation of a not-for-profit monopoly into a for-profit one, which will benefit ISOC and a few individuals by inconveniencing millions of others.  I have questions:

  • Do affected parties have recourse?
  • Other than polite letters, do any responses have teeth?
    • Maybe: Official complaints have been filed, but don’t expect results.
    • Chronic optimists can .. take part in ICANN and ISOC governance
  • Has anyone currently at ICANN + ISOC made substantive comment?
  • Vint Cerf said: ‘Hard to imagine $60/year would be a deal breaker for even small non-profits.
    • How did we get to Net pioneers embracing 99% profit margins?

For more backstory, read on…
(more…)



Generalized classification of claims’ meaningworthiness
Thursday January 03rd 2019, 1:12 pm
Filed under: Blogroll,chain-gang,ideonomy,knowledge,meta,wikipedia

Generalizing a Foucault comment from 1970 on accepted shared knowledge, truth, and power:


The system of [assigning value to statements] is essential to the structure and functioning of our society.  There is a constant battle around this – the ensemble of rules according to which [valued and devalued statements] are separated and specific effects of power are attached to the former.  This is a battle about the status of truth and the practical and political role it plays. It is necessary to think of these political problems not in terms of science and ideology, but in terms of accepted knowledge and power.

Here are a few propositions, to be further tested and evaluated:

  1. Let τ be a system of ordered procedures for the production, regulation, distribution, [evaluation], and operation of statements.  A system linked in a circular way with systems of power that produce and sustain it, and with the effects of power which it induces and which extend it.  A regime of systems.  Such a regime is not merely ideological or superstructural; its [early stage] was a condition of the formation and development of its environment.
  2. The essential [social, political] problem for designers and maintainers of τ is not to criticize its ideology or [relation] to science, or to ensure a particular scientific practice is [correct], but to ascertain how to constitute new politics of knowledge. The problem is not changing people’s beliefs, but the political, practical, institutional regime of producing and evaluating statements about the world.
  3. This is not a matter of emancipating τ from systems of power (which would be an illusion, for it is already power) but of detaching its power from the forms of hegemony [social, economic, cultural], within which it operated [when it was designed].
  4. These [political, social, economic, cultural, semantic] questions are not error, illusion, ideology, or distraction: they illuminate truth itself.

I have been thinking about this in the context of recent work with the Knowledge Futures Group and the Truth & Trust coalition gathered around TED.

(from an interview with Foucault first published in L’Arc 70.)

Comments Off on Generalized classification of claims’ meaningworthiness


Anonymizing data on the users of Wikipedia
Wednesday July 25th 2018, 12:22 pm
Filed under: chain-gang,citation needed,Glory, glory, glory,wikipedia

Updated for the new year: with specific things we can all start doing 🙂

Wikipedia currently tracks and stores almost no data about its readers and editors.  This persistently foils researchers and analysts inside the WMF and its projects; and is largely unnecessary.

Not tracked last I checked: sessions, clicks, where on a page readers spend their time, time spent on page or site, returning users.  There is a small exception: data that can fingerprint a user’s use of the site is stored for a limited time, made visible only to developers and checkusers, in order to combat sockpuppets and spam.

This is all done in the spirit of preserving privacy: not gathering data that could be used by third parties to harm contributors or readers for reading or writing information that some nation or other powerful group might want to suppress.  That is an essential concern, and Wikimedia’s commitment to privacy and pseudonymity is wonderful and needed.

However, the data we need to improve the site and understand how it is used in aggregate doesn’t require storing personally identifiable data that can be meaningfully used to target editors in specific. Rather than throwing out data that we worry would expose users to risk, we should be fuzzing and hashing it to preserve the aggregates we care about.  Browser fingerprints, including the username or IP, can be hashed; timestamps and anything that could be interpreted as geolocation can have noise added to them.

We could then know things such as, for instance:

  • the number of distinct users in a month, by general region
  • how regularly each visitor comes to the projects; which projects + languages they visit [throwing away user and article-title data, but seeing this data across the total population of ~1B visitors]
  • particularly bounce rates and times: people finding the site, perhaps running one search, and leaving
  • the number of pages viewed in a session, its tempo, or the namespaces they are in [throwing away titles]
  • the reading + editing flows of visitors on any single page, aggregated by day or week
  • clickflows from the main page or from search results [this data is gathered to some degree; I don’t know how reusably]

These are just rough descriptions — great care must be taken to vet each aggregate for preserving privacy. but this is a known practice that we could do with expert attention..

What keeps us from doing this today?  Some aspects of this are surely discussed in places, but is hard to find.  Past discussions I recall were brought to an early end by [devs worrying about legal] or [legal worrying about what is technically possible].

Discussion of obstacles and negative-space is generally harder to find on wikis than discussion of works-in-progress and responses to them: a result of a noun-based document system that requires discussions to be attached to a clearly-named topic!

What we can do, both researchers and data fiduciaries:

  • As site-maintainers: Start gathering this data, and appoint a couple privacy-focused data analysts to propose how to share it.
    • Identify challenges, open problems, solved problems that need implementing.
  • Name the (positive, future-crafting, project-loving) initiative to do this at scale, and the reasons to do so.
    • By naming the positive aspect, distinguish this from a tentative caveat to a list of bad things to avoid, which leads to inaction.  (“never gather data!  unless you have extremely good reasons, someone else has done it before, it couldn’t possibly be dangerous, and noone could possibly complain.“)
  • As data analysts (internal and external): write about what better data enables.  Expand the list above, include real-world parallels.
    • How would this illuminate the experience of finding and sharing knowledge?
  • Invite other sociologists, historians of knowledge, and tool-makers to start working with stub APIs that at first may not return much data.

Without this we remain in the dark —- and, like libraries who have found patrons leaving their privacy-preserving (but less helpful) environs for data-hoarding (and very handy) book-explorers, we remain vulnerable to disuse.



In eternal rhyme: as Cyberiad draws nigh, a tiny Lem shrine
Sunday March 25th 2018, 1:49 pm
Filed under: chain-gang,Glory, glory, glory,noetic,poetic justice

Stanislaw Lem‘s Cyberiad is a miracle of 20th century literature, and of translation. I want to preserve parts of two stories here in as many languages as I can find.  Sources wanted for both, if you have a copy in your language:

  • The poems of Trurl’s Electronic Bard, with their exquisite compact wordplay.
  • (to come!) The story How the World Was Saved — where everything beginning with a single letter is destroyed. Douglas Hofstadter’s paean to translation, Le Ton Beau de Marot, touches on the challenges with translating this story.  

(more…)



Mental battlefield: How we are forfeiting the zeroth AI war
Monday August 07th 2017, 6:03 pm
Filed under: %a la mod,chain-gang,knowledge,metrics,popular demand

Part 2: Forging Social Proof – the Networked Turing Test Rules the First AI War

Last week, Jean Twenge wrote the latest in a series of reflections on connected culture: “Have smartphones destroyed a generation?

Some commentators wrote off her concerns as the periodic anxiety of an older generation seeing technology changing the world of their children, comparing it to earlier concerns about books or television.  But I don’t see this as Yet Another Moral Panic about changing tech or norms. I see it as an early AI conflict, one that individuals have lost to embryonic corporate AI.

The struggle is real

We have greatly advanced algorithms for claiming and retaining human attention, prominently including bulk attacks on shared Commons such as quiet spaces, spare time, empty mailboxes. This predates the net, but as in many areas, automation has conclusively outpaced capacity to react. There’s not even an arms race today: one the one hand, we have a few attention-preserving tools, productive norms that increasingly look like firewall instructions, a few dated regulations in some countries. On the other hand, we have a $T invested in persuasion, segmentation, attention, engagement: a growing portion of our economy, dinner conversations, and self-image as a civilization.

Persuasion is much more than advertising. The libraries of mind hacks and distractions we have developed are prominent in every networked app and social tool. Including simple things like adding a gloss of guilt and performative angst to increase engagement — like Snap or Duolingo adding publicly visible streaks to keep up daily participation.

We know people can saturate their capacity to track goals and urgencies. We know minds are exploitable, hard sells are possible — but (coming from a carny, or casino, or car salesman) unethical, bad for you.  Yet when the exploit happens at a scale of billions, one new step each week, with a cloak of respectability — we haven’t figured out how to think about it.  Indeed most growth hackers & experience designers, at companies whose immersive interfaces absorb centuries of spare time each day, would firmly deny that they are squeezing profit out of the valuable time + focus + energy of users :: even as they might agree that in aggregate, the set of all available interfaces are doing just that.

Twenge suggests people are becoming unhappier the more their attention is hacked: that seems right, up to a point. But past that point, go far enough and people will get used to anything, create new norms around it. If we lose meaningful measures of social wellbeing, then new ones may be designed for us, honoring current trends as the best of all possible worlds. A time-worn solution of cults, castes, frontiers, empires. Yet letting the few and the hawkers of the new set norms for all, doesn’t always work out well.

Let us do better.
+ Recognize exploits and failure modes of reason, habit, and thought. Treat these as important to healthy life, not simply a prize for whoever can claim them.
+ Measure maluses like addiction, negative attractors like monopoly, self-dealing, information asymmetry.
+ Measure things like learning speed, adaptability, self sufficiency, teamwork, contentment over time.
+ Reflect on system properties that seem to influence one or the other.
And build norms around all of this, countering the idea that “whatever norms we have are organic, so they must be good for us.

Comments Off on Mental battlefield: How we are forfeiting the zeroth AI war


Designing life for episodic tyranny | 1: Secure toolchains
Friday November 11th 2016, 6:00 pm
Filed under: Aasw,Blogroll,chain-gang

See also Part 2: social networks

Motivation

Classify your local environment according to how much freedom you have to create and share tools, access those of others, and communicate across secure networks.  
  • In a “Tier 1” environment you have access to all popular security technology, and can build whatever infrastructure you want, entirely within your control.  
  • In a “Tier 2” environment, central network nodes and critical infrastructure all have backdoors and logging, and noone is allowed to distribute strong cryptography that some central group is unable to break.  
  • In a “Tier 3” environment, using secure tools and all but trivial cryptography is illegal – you shouldn’t have anything to hide.  Even talking about such tools may put you on a blacklist.  A central group that enforces the law may also access, modify, or reassign your work and possessions at will.
Say you live in a Tier 1 jurisdiction, which controls land, banks, and physical infrastructure.  Periodically, it shifts for a time to a Tier 3 regime, which may make abrupt changes at any depth in society to suit the fashion of the moment.
 
While in the latter regime, you can’t always trust the law or social norms to preserve
  • Your right to communicate with others
  • Your right to use your own tools and resources
  • The visibility (to you and those around you) of how your rights and tools are changing, if these are taken away

Most infrastructure in such an environment becomes untrustworthy.  Imagine losing trust in AT&T, Google, Symantec, Cisco.  (Even if you trust the people who remain running the system, they might no longer be in full control, or may not be able to inform you if your access was altered, filtered, compromised.)  

What can you do while in a Tier 1 regime to moderate the periods where you have fewer rights?

These are some quick thoughts on the topic, from a recent discussion.  Improvements and other ideas are most welcome.

Technical design decisions to improve resilience:

1.  multi-homing, letting users choose their jurisdiction.  for instance, let you choose from a number of wholly independent services running almost the same stack, each within a different jurisdiction.
  1a.  Be able to choose who hosts your data, tools, funds.  E.g., fix current US-EU policy – give users choice of where data resides and under which laws.
  1b.  Measure: how long it takes to shift key storage / control elements betweeb jurisdictions, copying rather than mirroring any required pieces.  Make it possible to shift on the timescale of expected transition between Tiers.
 
2. Give users advance warning that the threat to their data/account is rising; make it possible to quickly change what is stored [not just what is shared with other users].
2a. Learn explicitly from how banking does this (cf. concerns among many users about funds being frozen, for less-than-fascist conflicts).
 
3. work with telcos to add built-in IP and egress-fuzzing
   3a.  consider what china does: blocking per IP, by each egress point.  harder but possible in the US.
 
4. multi-source hardware, and any other needed ‘raw materials’ at each level of abstraction
  4a.  Both multiple sources w/in a jurisdiction (for the first stages when only some producers have lost control of their own production), and in different jurisdictions.
 
5. have systems that can’t be subverted too quickly: relying on the temporary nature of the fascist trend.  (if it lasts long enough, everything mentioned here can be undone; design to make that take a reasonable amount of time and a lot of humanpower)
  5a.  add meshes – like the electrical grid, that have local robusness. When central management disappears or ‘shuts things off’, local communities can build a smaller-scale replica that uses the physical infrastructure [even if they have to go in and replace control nodes, like generators, by hand]. 
  5b.  make change happen on the lifescale of hardware that has to be replaced.  e.g. a bulk of investment in dumb pipes that have to be replaced or removed by hand.  Systems with high upfront infrastructure costs that are easy to maintain but relatively hard to replace.
 
6. design alternate solutions for each level of the stack that have minimal central requirements.  E.g. fuel-powered USB chargers, gas generators, solar panels, desktop fabs and factories.  Make it easy to produce inferior, but usable, components if the high-economy-of-scale sources dry up.
 
7. keep strong contacts with someone in the existing [government], even when there’s nothing that you need to lobby for. that makes transitions smoother, and you less likely to be surprised by change.  Cf. Idea 3: invest heavily into those social relations.
 
8. distribute end-user tools that let individuals adapt under hostile conditions.  Examples:
  8a.  Ship antennas or power sources flexible enough to be modded.  
  8b.  Allow broadcast updates to the latest version, but allow users to freeze the version at one they support.  
  8c.  Support unblockable rollbacks to earlier revisions: something like a hardware button that rollsback to one of a few previous versions, if you realize you’ve installed malware or controlware.  you can still push updates as agressively as you like, as long as the provider can hint that a new snapshot is useful as risks of overtaking increases.
  8d.  provide some sort of checksum to see if firmware has changed [even with above may be possible for new software to change that option; but users should at least know]

Related ideas

1. consider reasonable steps to degrade control:  
  1a.  starting with increased infra for those who align with government views.  (or decreased for those breaking new / stringent laws)
  1b.  compare how voting is restricted, liquidity is restricted.
 
2. consider: is it better to be asset-heavy or asset-light?  
  2a.  usefulness of land and resources to use, vs. having things that can’t be claimed / revoked. networks rather than assets – land, tools?  
  2b.  compare liquidity of favors to that of funds or items.
 
3. compare current work with regulations/regulators.  in politics, relationships w/in a commission made it valuable to have a rotating door.  Invest in those relations, considering also 2) above – invest before assets are frozen to offset risk.
 
4. compare how US corps plan for inter-state shifts within the country.  Including being flexible enough to move to a new state for favorable regs, or shift ops/people among different centers.
5. Currently there’s network-tracking of IP addresses in malls, &c.  There are tools now that have a ‘War mode’ that randomizes your MAC or other address all the time.  Injecting noise into bluetooth and other tracking is straightforward.
Comments Off on Designing life for episodic tyranny | 1: Secure toolchains


Psych statistics wars: new methods are shattering old-guard assumptions
Thursday October 20th 2016, 12:51 pm
Filed under: %a la mod,chain-gang,citation needed,Glory, glory, glory,knowledge,meta,metrics

Recently, statistician Andrew Gelman has been brilliantly breaking down the transformation of psychology (and social psych in particular) through its adoption of and creative use of statistical methods, leading to an improved understanding of how statistics can be abused in any field, and of how empirical observations can be [unwittingly and unintentionally] flawed. This led to the concept of p-hacking and other methodological fallacies which can be observed in careless uses of statistics throughout scientific and public analyses. And, as these new tools were used to better understand psychology and improve its methods, existing paradigms and accepted truths have been rapidly changed over the past 5 years. This shocks and anguishes researchers who are true believers in”hypotheses vague enough to support any evidence thrown at them“, and have built careers around work supporting those hypotheses.

Here is Gelman’s timeline of transformations in psychology and in statistics, from Paul Meehl’s argument in the 1960s that results in experimental psych may have no predictive power, to PubPeer, Brian Nosek’s reprodicibility project, and the current sense that “the emperor has no clothes”.

Here is a beautiful discussion a week later, from Gelman, about how researchers respond to statistical errors or other disproofs of part of their work.  In particular, how co-authors handle such new discoveries, either together or separately.

At the end, one of its examples turns up a striking example of someone taking these sorts of discoveries and updates to their work seriously: Dana Carney‘s public CV includes inline notes next to each paper wherever significant methodological or statistical concerns were raised, or significant replications failed.

Carney makes an appearance in his examples because of her most controversially popular research, with Cuddy an Yap, on power posing.  A non-obvious result (that holding certain open physical poses leads to feeling and acting more powerfully) became extremely popular in the popular media, and has generated a small following of dozens of related extensions and replication studies — which starting in 2015 started to be done with large samples and at high power, at which point the effects disappeared.  Interest within social psychology in the phenomenon, as an outlier of “a popular but possibly imaginary effect”, is so great that the journal Comprehensive Results in Social Psychology has an entire issue devoted to power posing coming out this Fall.
Perhaps motivated by Gelman’s blog post, perhaps by knowledge of the results that will be coming out in this dedicated journal issue [which she suggests are negative], she put out a full two-page summary of her changing views on her own work over time, from conceiving of the experiment, to running it with the funds and time available, to now deciding there was no meaningful effect.  My hat is off to her.  We need this sort of relationship to data, analysis, and error to make sense of the world. But it is a pity that she had to publish such a letter alone, and that her co-authors didn’t feel they could sign onto it.

Update: Nosek also wrote a lovely paper in 2012 on Restructuring incentives to promote truth over publishability [with input from the estimable Victoria Stodden] that describes many points at which researchers have incentives to stop research and publish preliminary results as soon as they have something they could convince a journal to accept.

Comments Off on Psych statistics wars: new methods are shattering old-guard assumptions


Digital rights groups in Europe are gaining ground: a model to watch
Friday April 04th 2014, 1:13 pm
Filed under: Blogroll,chain-gang,international,knowledge

The recent historic wins for net neutrality in the EU demonstrate an organized and informed advocacy network that is still not echoed in the US or in many other parts of the world. We should celebrate and learn from their work.

Thanks to Axel Arnbak for his thorough and delightful writeup of this.

Comments Off on Digital rights groups in Europe are gaining ground: a model to watch


Women’s Public Voice: points left out of Mary Beard’s history of speech
Sunday March 02nd 2014, 10:38 pm
Filed under: chain-gang,Glory, glory, glory,metrics,poetic justice,popular demand

Bruce recently recommended an essay on the historical public voice of women, by noted classicist Mary Beard.

Beard is a fine and provocative writer; it is good rhetoric.

But I don’t think it gives much insight into historical causes, or ways we can bring about change. Women face deeply gendered and hateful criticism today, particularly online. The argument that this is due to Greco-Roman rhetorical traditions, or the Western literary canon, is unconvincing. I see selection bias in Beard’s examples.

I would love to see a version of this essay that gets nuances right, and tries to explain changes in the past century based on its arguments.

Left out:
+ The complexity of women’s voice in Rome, from Fulvia and Livia to Irene of Athens;
+ Greek admiration of Gorgo, Roman admiration of Zenobia;
+ Conflicting views of leaders in adjacent cultures (Boudica, Cleopatra, Dido);
+ The Old Testament (Deborah and Esther ?)

Misused for effect:
– Ovid: No metamorphs of any gender could speak; Io for one was changed back.
– Fulvia: First by describing her as someone’s wife, though she was one of the most powerful figures in Rome; then by framing her hatred of Cicero as a matter of gender.


On a tangent: Two speeches I love, to lift the spirits. (Both American; I know less oratory from the rest of the world. Suggestions welcome!):

Frances Wright on global patriotism and change:
# Independence Day speech at New Harmony (1828)

Margaret Chase Smith on an issue too great to be obscured by eloquence, thankfully no longer a concern today:
# Declaration of Conscience (1950)

Comments Off on Women’s Public Voice: points left out of Mary Beard’s history of speech


Sacrifice Mt. Gox: This will be good for Bitcoin because
Tuesday February 25th 2014, 2:04 pm
Filed under: %a la mod,chain-gang,fly-by-wire

Comments Off on Sacrifice Mt. Gox: This will be good for Bitcoin because



Bad Behavior has blocked 184 access attempts in the last 7 days.