Twitter’s use of algorithms

Social media has evolved over the past few years. Social media networks such as the Facebook, Twitter or Instagram has been amongst the frontrunners to bring the latest happening globally to our desktops and smartphones. Much of this is done through the use of algorithms, which brings what interests us or what we wish to see or have been seeing recently appear more visible. Facebook has been doing this in their News feed for years now, but Twitter is about to change the way its tweets appear.

While Twitter has been the biggest loser in the technological markets, with its shares declining and users angry, Twitter has decided to bring something new and fresh to the table for its users. Twitter shortly started testing the use of no limits on how much you can write as a Tweet, with another notable testing being done towards the way tweets are shown. Currently, twitter follows a chronological order of allowing viewers watch their tweets, which includes What You have missed while you were away feature, as well as using a timeline to review retweets and replies on a tweet. All this may change this week by an opt-in service that would use algorithms to bring tweets to your news feed.

There had been a backlash with #RIPTWITTER used to highlight what twitter is doing wrong, but the CEO of Twitter Jack Dorsey has made it clear that the new algorithms will make it more Twitter-y. Twitter will look more lively while showing you the tweets you wish to see from specific topics being shown first or more visible. Twitter already allows making important tweets visible by making them large, but this new algorithm will track your interests, flushing the big chunk of unwanted tweets, and allow you to know what the latest happenings are in a more synchronized manner. Hope Twitter finds a way out to make it more engaging, as Twitter followers are in no mood for any more testing which can bring the whole network crashing down.

Make Your Passwords Uncrackable

Hacking has emerged as a serious problem in recent times and no one is safe from these online criminals. If US Military can’t protect their secret data from Chinese and Russian hackers, then how can we? The impact that these hacks have is massive and affects everyone ranging from an individual to country level.

On big scale its effect can be seen by the fact that some reports have made huge claims and said that the growth of Chinese industry is due to the hacks on American research and industries. On individual level hacks can lead to emotional as well as monetary damage. We on individual level can protect ourselves from these hacking attempts. The most important way to protect ourselves from hackers is to create a very strong password.

First, we should know about the concept of Entropy. In information theory Entropy is a measure of unpredictability of information content. As such to make a good password it should have high entropy. The problem with us, humans while generating passwords is that we never use random passwords. This weakness is used by hackers when they do dictionary attacks. And so if your password falls on the most commonly used password list then your account will definitely get hacked.

In order to prevent any pattern in your password most sites therefore advise to use special characters and numbers in your password. We have however even exploited this method and almost everyone adds numbers and special characters in the beginning or the end thus again giving rise to a pattern. So, what we must do to make a very strong password with high entropy is to prevent any pattern from rising in our passwords, when using special characters and numbers don’t add them just in the beginning or end rather add it in a random pattern and also don’t forget to see the list of most used passwords and make sure that your password isn’t in that category.

Random Numbers Generation Algorithm

Joan R. Ginther won the Texas lottery four times and is considered by some to be the luckiest person alive and why not, the chances of this has been calculated to be one in eighteen septillion and this luck could only come once in a quadrillion years.

But other more educated people doubt this statement and believe that Ms Ginther being a PhD from Stanford in statistics might have determined the algorithm that determines the winner and thus won these lotteries not out of luck but by science.

We know that these slot machines and lotteries are based on random number generation algorithms, but the question comes to mind that if these are truly randomly generated then how could someone have predicted their outcomes? The answer lies in the fact in study of random number algorithms.

If you have ever taken an introductory programming course then the first lecture taught by most teachers is that computers are dumb, which essentially means that they don’t know anything and do only what is programmed into them.

This statement has large implications and as such means that you can’t actually generate random numbers using computer code. However random numbers play a very important role in computers ranging from games to complex security systems they are used very frequently.

There are two types of random number generation algorithms, Pseudo Random Number Generation algorithms (PRNGs) and True Random Number Generation Algorithms (TRNGs).

PRNGs generate random numbers by using only algorithms and are as such not truly random since the presence of an algorithm means that they are deterministic and hence can be predicted however these random numbers are efficient. A very rough example would be using digits of pi.

TRNGs on the other hand are based on a natural phenomenon which occurs randomly like atmospheric noise, dice rolls etc. these are in effect true random numbers. These number algorithms are however not very efficient but produce non predictable results.

Does NSA Actually Have Access to Every Camera and Microphone in the World

The paranoia regarding privacy is more than ever due to recent events such as Microsoft admitting that each and every message on Skype is backed up on server and is constantly monitored. The most notorious among this lot is considered to be the NSA, which has been rumored to be able to access every camera and microphone in the world. But is this true or a hoax used to increase fear and a feeling of being paranoid amongst the people? Let’s find out:

The short and simple answer for this is: yes, they do. The National Security Agency can actually access such core features without the need of anything specific through terms known as back doors (which is something frequently used by hackers when they want to hack a website). The only difference from this back door with the others is that this back door is actually present inside the processor of any electronic device, which all of us are aware is the main reason that any electronic device operates in the first place.

What’s worse is that no one is safe from such attacks. Be it your iPhone, Android, Windows Phone, Windows OS, Macintosh OS and even Linux OS, NSA just has access to the backdoor in each and every Operating System. And the worst part among all of this is that it isn’t some conspiracy within the government or done by some bad people within the government secretly, the NSA actually receives a yes from FBI and other authorities to carry out such actions without telling the general public about it in order to prevent protests. But they did get caught more than a few times, particularly when a high ranking official in the NSA confirmed that they do have access to each and every microphone and camera for ‘security’ purposes.

Digital Assaults

A previous and a present executive of the Focal Knowledge Organization, the US’ debut insight office, have laid the fault for Friday’s assaults in Paris at Edward Snowden’s feet. Giving a discourse to the Middle for Vital and Universal studies, Brennan, the present executive of the CIA, made the point that the Snowden revelations made an environment for insight organizations that hampered their capacity to discover terrorists. I don’t think they have enhanced our capacity to gather and utilize insight.

Numerous took to their soapboxes hours after Friday’s assault in the funding to attempt to inspire some sort of political point upon the slaughter. Obviously, universal punch-pack for the security group that he is, Snowden confronted this sort of fault not simply from the present and previous mandarins of the CIA yet from different sources also. It is really clear that his bean-spilling has taught a percentage of the nastiest individuals on the planet how to abstain from being gotten.

Harvey included that we should think about a fortified accentuation on human insight, that is to say, the traditional method of surveillance that places specialists inside of foe associations. The answer is not to debilitate encryption, since that is a losing fight. While it should in fact be possible, it is difficult to control and authorize. There are such a variety of courses out there that malignant gatherings can convey and as the following inquiry infers, terrorists have enough digital expertise, they don’t require outside help.

The case that the Snowden’s divulgences permitted terrorists to better see how they were being followed and to begin utilizing encryption appears an unusual one as Jihadist gatherings were utilizing scrambled interchanges much sooner than Snowden chose to “decoded” his managers’ privileged insights. Morell said that this sort of encryption is exceptionally troublesome or almost inconceivable for governments to break, and the makers don’t deliver the keys important for law requirement to peruse the scrambled messages. ISIS and Al Qaeda are known not Telegram to share data on the best way to perform digital assaults and make weapons. The second offender the powers have said is quite recently this sort of scrambled correspondence and some in force have correspondingly increase their gets back to for entryway access. Plainly the web is turning into another assault vector for terrorism, with radical gatherings not just selecting and spreading their messages through online instruments however endeavoring to really dispatch digital assaults on western targets.

Preventing Email Phishing

To date, around 400 million ruptures have yielded programmers some sort of individual data, as indicated by Arun Vishwanath, a partner educator in the Branch of Correspondence at the College at Wild ox and a specialist in digital trickiness. These are the firmly focused on, malware-conveying assaults that send connections or connections in what regularly have all the earmarks of being bona fide looking email messages. Clients dispatch the malware – meddlesome programming that starts gadget trading off foundation programs – when they tap the connection or open the connection.

Organizations in the general population and private segments instruct individuals to perceive phishing, yet those endeavors frequently fall flat or don’t work for long in light of the fact that the preparation overlooks clients’ propensities.”We can’t simply concentrate on one part of that utilization, yet that is what we’re doing and it clarifies why phishing is fruitful.” Data handling is about breaking down and responding to a domain or circumstance. It’s logical, such as attempting to decide the substance of an unmarked container. Propensities rise up out of an alternate learning process and exist as a different wonder from data preparing, says Vishwanath.

Programmers unexpectedly hit the same check that the preparation intended to stop those misses. Phishing is fruitful in light of the fact that the culprits exploit individuals who are routine in the way they react. What’s more, security levels don’t assume a part. Lance phishing is an individual’s issue, and it works 17-35 percent of the time – even after individuals have been prepared. “The preparation and instruction intended to quit phishing is about asking what’s in the container,” he says. “It’s contextual.”In genuine practice, numerous exercises are routine, or a blend propensity and data preparing.”

Those individuals’ schedules are disregarded in preparing records for why they so rapidly continue those schedules – some of the time, minor hours subsequent to being prepared. It never clarifies why they’ve had a mishap.” The issue is not an absence of mindfulness. Email frameworks, particularly when gotten to on cell phones, are assembled to make and cultivate propensities.

“Schedules are effective and difficult to stop,” he says. Indeed, even advanced email frameworks that banner suspicious messages don’t offer on the grounds that clients some assistance with becoming desensitized to the notices and rapidly continue their propensities. “Modifying the sorts of notices issued would mirror the part of schedules and make the messages more remarkable; however we’re not doing that.”

Information Leaks from Smartphone Apps

An examination group drove by David Choffnes, a partner educator in the School of PC and Data Science, has discovered “broad” spillage of clients’ data gadget and client identifiers, areas, and passwords into net­work movement from applications on cell phones, including iOS, Android, and Win­dows telephones. The specialists have additionally figured out how to stop the stream. Choffnes will introduce his discoveries at the Information Straightforwardness Lab 2015 Meeting, held at the Media Lab at the Massachusetts Establishment of Innovation. Our gadgets truly store every little thing about us on them: who our contacts are, our areas, and enough data to recognize us in light of the fact that every gadget has a remarkable identifier number incorporated with it.

A great deal of system activity that about-faces and forward isn’t secured by encryption or different means, he clarifies. Which may be alright when you present your email location to an application to, maybe, subscribe to its bulletin. What’s truly disturbing is that we even see critical quantities of applications sending your secret key, in plaintext intelligible structure, when you sign in. In an open Wi-Fi setting, that implies anybody running ‘some really basic programming’ could catch it.

A June 2015 Forrester Exploration study reported that Cell phone clients spend more than 85 percent of their time utilizing applications. Yet, little research has been done on applications’ system movement in light of the fact those cell phones’ working frameworks, instead of those of tablets and desktops are so hard to break. His study took after 31 cell phone clients together they had 24 iOS gadgets and 13 Android gadgets that utilized ReCon for a time of one week to 101 days and afterward checked their own spillages through a ReCon secure website page. The outcomes were disturbing. Depressingly, even in our little client study we discovered 165 instances of qualifications being spilled in plain content, the scientists composed.

Cyber Attacks Studied Through the Lens of EEG and Eye Tracking

The study broke down clients’ cerebrum action and eye stare developments as they were subjected to these assaults. This new research was exhibited at the 2015 ACM Gathering on PC and Interchanges Security a week ago in Denver.

This study from scientists inside of the UAB School of Expressions and Sciences Branch of PC and Data Sciences and Community for Data Affirmation and Joint Legal sciences Exploration depended on the learning that recognizing malware and phishing assaults are client focused capacities, yet little is comprehended about the client conduct fundamental these assignments. There is some earlier learning on this subject with respect to clients’ execution in these security assignments, yet UAB’s examination took the work to the studying so as to follow level clients in a close reality setting and assessing more than one neuro physiological measure amid a solitary study.

Specialists took a three-dimensional way to deal with this study by taking a gander at what the clients’ assignment execution was through assessing how they handle the errands of distinguishing cyber attacks with neural movement, which was caught utilizing electroencephalogram, or EEG, intellectual measurements and with eye stare designs, which were caught utilizing an eye-tracker.

By taking a gander at these three measures together, we could demonstrate that clients don’t invest enough energy breaking down key phishing markers, and frequently come up short at distinguishing phishing assaults notwithstanding when they are rationally occupied with the errand and subliminally preparing genuine locales uniquely in contrast to fake destinations. Under malware assaults, we observed the inverse to be valid. Clients were observed to be regularly perusing, conceivably understanding and in the long run heading the message implanted in the malware cautioning.

The look examples demonstrate that clients are perusing the notices, the neural movement demonstrates that clients are experiencing high workload and are exceedingly connected with when notices were shown, and the undertaking exactness demonstrates that clients notice notices an expansive greater part of the time. Additionally, for phishing assaults, an immediate relationship was found between the clients’ consideration control, which is viewed as an identity quality, measured through a paper-and-pencil test, and how precise they were at recognition. These outcomes give analysts the establishment whereupon to start outlining components that will utilize continuous neural and eye-stare highlights that can consequently surmise a client’s readiness state, and figure out if or not the client’s reaction ought to be depended upon.

Google threatens Action Against Symantec

Google needs Symantec to reveal all authentications issued by its SSL business going ahead, after what Google considers a messed up examination concerning how Symantec workers issued SSL endorsements for space names that the organization did not possess. The program creator likewise needs the security firm to distribute a point by point examination of how the occurrence was explored. Through its securing of Verisign’s validation specialty unit in 2010, Symantec got to be one of the biggest testament powers (CAs) on the planet. Such associations are trusted by programs and working frameworks to issue advanced declarations to area proprietors which are then used to encode online interchanges. In September, Google found that Symantec had issued a pre-testament for google.com without its information. Considerably additionally astonishing was this declaration was an Expanded Approval (EV) one, and in this manner should require broad confirmation of the asking for substance’s character and responsibility for space.

Google found the occurrence on the grounds that, as a component of its Chrome program approaches, it requires all CAs to uncover the EV testaments they issue in an open review log as a major aspect of another convention called Endorsement Straightforwardness (CT). Taking after the episode, Symantec discovered that the declarations being referred to were issued amid item testing and never left the association. It additionally terminated a few workers who neglected to take after interior arrangements. The organization’s introductory examination discovered that 23 test testaments had been issued for space names fitting in with Google, Musical drama and three other anonymous associations. In any case, with just “a couple of minutes of work” Google had the capacity find extra unapproved declarations that Symantec missed, raising doubt about the consequences of the organization’s inward review.

Accordingly, Symantec re-opened the examination and revealed an extra 164 test authentications that it issued for 76 spaces it didn’t claim and 2,458 testaments issued for areas that hadn’t been enlisted. Google is currently calling for Symantec to distribute a nitty gritty examination of its inability to identify all authentications amid the introductory review and needs the organization to clarify the underlying drivers for every infringement of existing industry strategies. The program creator additionally needs Symantec to report every one of the endorsements it issues, not only the EV ones, to the CT sign later on. Starting with Jun. 1, 2016, Google Chrome may begin to show notices for Symantec-issued testaments that don’t bolster CT, Google said in a blog entry Wednesday.

Identifying Problems with National Identifiers

Driven by Teacher of Government and Innovation in Living arrangement Latanya Sweeney, a group of specialists in two trials had the capacity decode more than 23,000 RRNs utilizing both calculation and intelligent thinking. The discoveries propose scrambled to secure protection, they stay defenseless against assault and must be intended to keep away from such shortcomings. The studies are depicted as well as distributed in Innovation Science.

Sweeney as well as along with Ji Su Yoo, an Examination Associate at the Information Security Lab at Harvard and a creator of the study, had the capacity demonstrate that every supplanted with a letter in a conspicuous example. Utilizing such an example, they found themselves able to unscramble a large number of RRNs that could reveal individual data about their clients. They additionally found that, similar to charge cards, the last digit is a weighted total of former digits, which means analysts had the capacity unscramble the numbers, and then utilized number-crunching to affirm the exactness of the data they revealed. This is what you need to do to make sure of the fact which gets to go on the track. Well the perfect thing to do is just get the protection modes on.

South Koreans rely on upon expressly recognizing numbers for various monetary exchanges and it is badly arranged for organizations and people alike to check characters and track customers. In any case, at last, it is the South Korean populace that is getting information is so effortlessly de-anonym zed, singular security, not organization benefits, are traded off. Our study demonstrates that powerless encoding frameworks, which allude to the very plan strategies for securing protection. South Koreans know about framework – our concentrate along these lines asks a more vigorous update of these specifically recognizing numbers not just for the purpose of the foundations and framework that rely on upon them additionally for the people who use them.

Sweeney and Yoo led the study utilizing remedy information that was dared to be unknown in light of the fact that it did exclude quiet’s scrambled their RRN. Comparative information is regularly imparted to organizations around the globe who track wellbeing information – accepted to be mysterious – on a large number of South Koreans. Chairmen frequently utilize basic plans to encode individual data in light of the fact that it breezes through a face test – on the off chance that it looks alright, it must be alright.

Design a site like this with WordPress.com
Get started