1/ Thinking about the impact of the new strain (B117). Read this thread. It is significantly more transmissible than the previous strain, which means the measures we're used to can reduce classic infections, but they're *not yet good enough* in Denmark to stop growth.
2/ the difference between R < 1 and R > 1 is enormous. R<1, each day is better than the last. R>1, even a little, and each day is worse than the last.
3/ it appears to be particularly difficult to bring R below 1 for the new strain. If Denmark is having trouble, I don't know if the US can do it.
4/ B117 is in the US already. It's slated to be dominant in California by end of March.
5/ The speed at which we vaccinate is going to be key. Every week counts.
6/ and, I hate to say it, I suspect reopening schools before summer is likely to be a bad idea. If schools contribute even a little bit to R, they could mean the difference between having another serious wave or not.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Ben Adida

Ben Adida Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @benadida

7 Feb
1/ Saturday 🧵 on real-world security in voting machines.

Should voting machines be allowed to contain wifi hardware, later disabled in software?

At first glance, bad idea. Let's simply ban wifi hardware.

In practice, that would make machines less secure. Allow me to explain.
2/ Security is about threat models and tradeoffs. What this means in practice is more complex than it might seem. It means that "more security" on one specific aspect may lead to less security in the overall system.
3/ the threat model behind "no wifi" is that, with wifi turned on, attackers could remotely connect to the machine and do nefarious things. So what's the difference between software and hardware disabling of the wifi?
Read 16 tweets
22 Nov 20
1/ Why is Georgia counting votes for a third time? Let's talk about it.

npr.org/sections/biden…
2/ most states have recount procedures that trigger below a certain margin of victory. Sometimes automatic, sometimes has to be requested by a candidate. In Georgia, threshold is 0.5% & recount needs to be requested by a candidate after certification. Wait, what's certification?
3/ certification is the real result. When TV networks call an election, that carries no legal weight, it's just the media predicting the outcome. They're usually right, with some notable exceptions. Certification is when the state, having triple checked, declares their winner.
Read 13 tweets
20 Nov 20
1/ The @voting_works team has been working around the clock for the last week to support the State of Georgia in running their first state-wide risk-limiting audit, which turned into a full hand-count.
2/ Here's the Secretary of State's press release:

sos.ga.gov/index.php/elec…
3/ and coverage from AJC:

ajc.com/politics/break…
Read 8 tweets
14 Aug 20
1/ I spent a bit of time looking at the Canada COVID Alert app this evening. Bottom line: this app is pretty much the model for how to do this kind of tech.
2/ It's super clear about what data it collects and doesn't, and about how it works. This is not easy stuff to convey.
3/ It's such a caring and lovely flow. Here it is letting you know it's about to ask for that single permission it needs – to access the Google/Apple API.
Read 8 tweets
19 Jul 20
1/ In light of the voting question that will never die -- "if I can do X online, why can't I vote online" -- I'm reminded that most people don't have a good intuition for what makes things secure. So let's explore.

Security online depends predominantly on logging and auditing.
2/ This probably sounds weird and surprising, but hear me out. And there are exceptions that I'll get to. But truly, security depends predominantly on logging and auditing.
3/ Consider the Twitter hack from earlier this week. We found out about it because the attackers tweeted a Bitcoin scam visible to everyone. Twitter is, by definition, a public audit log. Those messages looked odd. We all saw them. That's why we all knew: Twitter was hacked.
Read 18 tweets
25 Jun 20
1/ a little story. When I was 18yo, summer 1995, I had the immense luck of working as an intern at Hearst Publishing in NYC. I was a rising sophomore, the web was just taking off, and that internship taught me so much, it dramatically kickstarted my career.
2/ the group VP was a guy who dressed like a banker and led the effort to create the first dynamic web site for Hearst. His office was on the 5th floor, top most floor of the Hearst building at the time, 57th and 8th (there's now a huge tower at that address.)
3/ About every other day, he wanted a demo, so he would call me up to his office from the dungeon basement where the small engineering team worked.
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!