PRC influence network: "[Posed] as locals in countries they targeted, post in Groups, amplify their own content, manage Pages, like and comment on other people’s posts particularly about naval activity in the South China Sea, including US Navy ships." about.fb.com/news/2020/09/r…
"In SE Asia where this network focused most of its activity, they posted in Chinese, Filipino & English about global news and current events including Beijing’s interests in the South China Sea; Hong Kong; content supportive of President Rodrigo Duterte & [Sarah's] potential run"
Chinese networks dabbling with IRA division tactics here: "In the US, where this network focused the least and gained almost no following, they posted content both in support of and against presidential candidates Pete Buttigieg, Joe Biden and Donald Trump."
Although Facebook's investigation finds links to Fujian for the first network disclosed, they don't publicly break out the exact origins. There are surely Chinese companies acting as guns-for-hire for other governments too, as we've seen a bit in prior commercial-like bot nets.
As Graphika points out, Facebook used more direct language with the Hong Kong influence network: "individuals associated with the Chinese government." They don't here. But the focus of this network fits into the overall PRC pattern.
Facebook is more direct with regard to the second network: "Although the people behind this activity attempted to conceal their identities, our investigation found links to Philippine military and Philippine police."
DFR's breakdown focuses on the second network, which is linked to the Philippine military:
With OpenAI officially commercializing today with Microsoft gaining an exclusive GPT-3 license, we're off to the races. I have no doubt that these models are already being used by influence actors. openai.com/blog/openai-li…
Take for example @liamport9's impressive GPT-3 generated Substack that took HackerNews by storm. "Only ONE PERSON has noticed it was written by GPT-3." liamp.substack.com/p/my-gpt-3-blo…
At the same time influence actors are investing in more 'authentic' networks, with genuine audiences, they are also surely investing is obfuscation infrastructure. The adversarial nature means platforms can't as transparently disclose those findings. Not a singular arms race.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
The plates for that Citizen 'Private Patrol' do match this vehicle from losangelesprofessionalsecurity.com, which describes itself as a "Subscription Law Enforcement Service." It apparently does everything from Apple Watch fall detection monitoring for the elderly, to alarm response.
After seeing the Instagram for 'LAPS,' which features this kitted out Model Y, I have so many more questions. instagram.com/p/CPBp2YKndZe/
"25 percent of kids 9-17 reported having had a sexually explicit interaction with someone they thought was 18 or older" platformer.news/p/the-child-sa…
"57 percent of youth who identify as LGBTQ+ said they have had potentially harmful experiences online, compared to 46 percent of non-LGBTQ+ youth. They also had online sexual interactions at much higher rates than their peers" @platformer
"The platforms with the highest number of minors reported potential harm were Snapchat (26 percent), Instagram (26 percent), YouTube (19 percent), TikTok (18 percent), and Messenger (18 percent)."
Triller has lost its mind: “Triller will pursue the full $150,000 penalty per person per instance for anyone who doesn't do the right thing and pay before the deadline” reut.rs/3b2bvCy
“Triller filed legal action on April 23 in U.S. District Court of Central California against the owners of the H3Podcast website for piracy of the event, and a dozen other sites that restreamed and profited from as many as hundreds of thousands of users each”
Triller has secured itself as a dead meme of an app. The ‘rebroadcast’ angle is a clear cut example of acceptable fair use. They’re targeting the YouTube couple that literally represents the landmark fair use ruling of Hosseinzadeh v. Klein
I slept through the opench.aix.uy drama, but the synopsis of this — and someone can correct me if I miss anything — is that ai-eks used their Clubhouse user token and had a bot join every room, collect the Agora tokens, and plug them into a browser client.
This technical breakdown shows how Clubhouse works. It's a scrappy startup, & there are 3 legs. Clubhouse has their own API for user management. It relies on Agora for RTC audio streams. And less spoken is that the room interactions flow over PubNub events theori.io/research/korea…
Unless I missed something, Clubhouse conversations weren't being recorded by the opench.aix.uy experiments. But, the metadata was indeed being scraped & relayed over the flask service. That's of course a cause for concern for the intimate, ephemeral network.
iOS release notes are always comforting when you have firsts like this. 3 zero-days actively exploited in the wild. 2 involving WebKit. "Apple said additional details would be available soon" techcrunch.com/2021/01/26/app…
The bricked state I encountered didn't end up having to do with the battery, at least obviously so. After a day of wrestling with DFU mode, it was successfully restored. If it attempted to boot, it would endlessly loop; breaking that cycle was hard.
The morning following the mobile Chrome stuttering, the device was very warm — like you would expect from an iCloud Photos daemon. Springboard worked, albeit dropping frames, but third party apps (I didn't test first party) began failing to boot. Upon shutdown, it was bricked.