An experiment at the boundaries of AI and human collaboration.
We are all invited to
Donate a word to become part of an ever evolving collective poem and create your own POEMPORTRAIT.
So I went to try it. It starts by asking you to “donate” a word. At that point, philistine that I am, all I could think of was Groucho Marx on the old game show ‘You Bet Your Life’, which always began with Groucho telling contestants that “Say the secret word and a duck will come down and give you 100 dollars.” (Shockingly, there seems to be no ringtone online with Grouch saying that. So here’s a video clip instead:)
Anyway, back to Google. I gave it my word (“Discourse” of course) and it announced that “An algorithm trained on over 20 million words of 19th century poetry is generating your unique POEMPORTRAIT.” I declined the offer to have my picture taken, and…voilà:
The poem was
That discourse of the word, Spellbind the corn, sighing and streaming.
It offered me a chance to save the ‘portrait’ so I did. But this is how it came out:
I’m reassured to see that AI’s too can be dyslexic.
SparkToro analyzes a random sample of 2,000 of your Twitter followers and tries to estimate how many are fake. I did OK (love the spike at 9 out of 10), and given the methodology I think the 12% fake number is probably a slight over-estimate..
Find the EFF surveillance self-defense guide. It offers advice tailored for different groups that might have greater / lesser needs for privacy/defense (e.g. LGBTQ, activists, journalists, lawyers, activists).
Use VPNs — virtual private networks. And only use good ones – be careful about jurisdiction and policies:
The UM off-campus VPN is a valuable service, and good to protect against third parties … but not against UM. Does UM log your usage? Do they record your originating IP#? The sites you visit? Despite some frantic Google searches, I can’t tell — it seems they don’t say. I think therefore you have to assume they do. And if were the UM General Counsel my first instinct would probably be to say they need to do the logging to protect themselves.
Is your VPN service dirt-cheap or free? Does the service cost only a few dollars for a lifetime service? There’s probably a reason for that and your browsing history may be the actual product that the company is selling to others.
Look for establishment in a democratic country with a strong commitment to the rule of law. Without that, even the best promises in the Terms of Service (ToS) to not log web page access OR IP# and access times is meaningless. Note that many, probably most, VPNs in most other countries are required to do some logging.https://it.miami.edu/a-z-listing/virtual-private-network/index.html
Does the VPN promise to prevent DNS leakage to your ISP?
Ideally, the VPN should support IPv6 as well as IPv4 to prevent leakage when the remote site is on IPv6. This will become more important in the future as more and more sites move to IPv6.
Inspect your browser settings on your phone and computer to set max privacy options (including blocking 3rd party cookies and enabling Do Not Track). Use a privacy hardened browser on your phone such as the Warp browser. On both computer and phone always use a search engine such as Duckduckgo that will not track you.
Encrypt every drive, every email (when possible), and especially all cloud-stored data before uploading it.
Get a password manager and use it – never re-use a password. Use 2-factor authentication for google, other services that support it. (Only 10% of google users do!)
Don’t put any apps on your phone that connect to anything financial (due to risk of ID theft if phone stolen).
Lobby UM to make it easier to use VPNs and Tor, on both the wired and wireless networks. Ask UM to be more transparent about what cookies its web pages set and what they track and record. And, importantly, ask UM to not require you take every single UM cookie in order to use the “remember me for 30 days” feature of its authentication app DUO. Also, ask UM to promise that it has your back, and that it will challenge any request for your data to the maximum extent the law allows (right now it makes no such promises at all; even National Security letters are sometimes withdrawn if the data-holding entity says it will go to court to ask for it to be reviewed).
Resist the frame: understand that the true definition of the ‘greater good’ is one in which the individual is able to flourish. Remember that ‘terrorist’ is a label that fits best after conviction – before that what we have is a ‘suspect’; conceivably any of us can be a suspect. So arguments that we should control crypto or prevent privacy in order to give law enforcement access to all our data when they decide they need it should be viewed with great caution and a firm eye on how the powers they want could be misused by them or by others who get hold of their tools. And even if we someday find ourselves in a world where things have gone badly wrong, and we do find ourselves subject to pervasive surveillance, follow Vaclav Havel, who in his great work ‘Living in Truth’ reminded us that so long as we choose not to self-censor we have chosen not to surrender a key part of our freedom.
Google Takeout–I didn’t know this was even possible, but you can download a copy of your email, contacts, calendar, google drive, and indeed everything google, in .zip format. Alas there is no way obvious way to automate it. So do it right away, or you’ll forget.