~~~~~~~~~~~~~~
Q-anon Scalability
~~~~~~~~~~~~~~
Even if the number of users to be evaluated is bounded, would it be practical to calculate q over, say, a million users for every API call?
"...such minimization generally scales linearly for the Facebook data that was tested..."
Let's posit that #QAnon is not a 'person' but 'an algorithm'; a 'process'.
"In 2001, Sweeney published a paper [8] describing the “re-identification” attack in which multiple public data sources may be combined to compromise the privacy of an individual. The paper proposes an anonymity definition called k-anonymity."
"Research suggests that this trend will continue toward seamlessly integrating personal information from diverse Internet sources, including social networks, mobile and environmental sensors, location and historical behavior"
"The first step in anonymizing a data set is removing the unique identifiers. The most common unique identifiers discussed in this paper are social network user IDs (#Facebook ID or username)."
Quasi-Identifiers :: Voting Records
Quasi-Identifiers are ASSUMED TO BE PUBLIC
Assumed Data Characterization :: FACEBOOK
FACEBOOK's 'TRUSTED DATA COLLECTOR'
~~~~~~~~~~~~~~~~~~ #QAnon DEFINITION
~~~~~~~~~~~~~~~~~~
2010 :: a Thread
"Privacy is measured in terms of "Q""
ADVERSARY :: DEFINED
#QAnon assumes "data is provided" via an "interactive interface"....
YOU'RE ALL SUCKERS, ANYWAY...
.
Somebody should ask Mark Zuckerberg of he's familiar with the q-anon model.
While he's hooked up to a lie-detector.
Did you mention that you like, 'AVATAR'?
What is Your "Q-VALUE" ?
Where are you and what bucket are you in with who else?
FACEBOOK CONNECTIONS
Bouncing Data, Compares, Normalizing and Extracting
Google - IMDb - Facebook
Combining 'Lord of the Rings' or 'LOTR' or 'The Rings Trology' or...
SANITIZING your Data for better q-anon values...
CZECH TECHNICAL UNIVERSITY
The q-anon ATTACKER...
q-anon
Anyone you know?
Dalenius’ desideratum
• • •
Missing some Tweet in this thread? You can try to
force a refresh
All it turned out to be was a dictum to be created then exploited.
It was exploited.
A sucker is born every minute.
Dalenius’ desideratum sounds like a dictum to be used as an exploit of personal privacy data, by using it as the basis for defending the collection, aggregation and analyses of same for the purposes of developing weaponized propaganda as a political tool.