@LukaszOlejnik@mastodon.social
@LukaszOlejnik@mastodon.social avatar

LukaszOlejnik

@LukaszOlejnik@mastodon.social

Security & Privacy. Data protection. Research. Engineering. Strategy, communication. Analyst. Technology Policy. W3C standardisation. PhD (CS/privacy), LL.M (Information Technology Law). Consultant (perhaps happy to do interesting work for you?). Reading & writing (scientific articles, sometimes op-eds, analyses, reports, a book). Seems that I like it?
email: me (at) lukaszolejnik.com.
Book: https://lukaszolejnik.com/book-philosophy-cybersecurity
Twitter: @lukOlejnik

This profile is from a federated server and may be incomplete. Browse more on the original instance.

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Israel allegedly conducted cyberespionage operations on International Criminal Court (ICC) for 9 years. Allegedly to intimidate the ICC and disrupt investigations into potential Israeli war crimes in Gaza. https://www.theguardian.com/world/article/2024/may/28/spying-hacking-intimidation-israel-war-icc-exposed

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Breakthrough judgment of European Court of Human Rights: states to provide judicial oversight & independent monitoring of surveillance. States must notify individuals subjected to surveillance. Evidence from illegal surveillance should not be used https://hudoc.echr.coe.int/app/conversion/pdf/?library=ECHR&id=003-7957259-11092429&filename=Judgment%20Pietrzak%20and%20Bychawska-Siniarska%20and%20Others%20v.%20Poland%20-%20complaints%20about%20Polish%20legislation%20on%20secret%20surveillance.pdf

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

The AI Overview in the core, critical, Google search product underwent some form of risk assessment. So they knew about these issues, deciding to accept the risk. No sane person would jump off a bridge because a search engine advised it, right? As Google said, such quirky advice is given in a small number of cases. Perhaps those few individuals who might follow the strange advice (glue, bridge, rocks, etc.) were deemed an acceptable risk, a business decision that someone had to approve?

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

China releases an AI chatbot trained on the thoughts of President Xi Jinping, the political philosophy “Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era”, as well as other official literature. Competition for OpenAI? https://www.ft.com/content/43378c6e-664b-4885-a255-31325d632ee9

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Scarlet Johansson's complaint on OpenAI using 'voice similar to her' in ChatGPT voice assistant. "demanding that OpenAI disclose how it developed...". . https://www.npr.org/2024/05/20/1252495087/openai-pulls-ai-voice-that-was-compared-to-scarlett-johansson-in-the-movie-her

Celebrities have it easier. In your or my case it's harder. Hence: my complaint: https://blog.lukaszolejnik.com/ai-llms-gdpr-complaint-and-human-dignity/

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Scarlet Johansson's complaint on OpenAI using 'voice similar to her' in the latest release of ChatGPT voice assistant. "demanding that OpenAI disclose how it developed an AI personal assistant voice" https://www.npr.org/2024/05/20/1252495087/openai-pulls-ai-voice-that-was-compared-to-scarlett-johansson-in-the-movie-her

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

My comments in TechCrunch. Google/Android AI feature to detect scams-calls is useful. It's client-side so privacy guaranteed. However, once client-side scanning and control is is baked into software infrastructure, nobody knows where it may lead. Censorship? Technology control of societies? Let's just be careful here. https://techcrunch.com/2024/05/15/googles-call-scanning-ai-could-dial-up-censorship-by-default-privacy-experts-warn/

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Google unveiled an LLM model that can monitor phone calls to detect suspected fraud. This technology indicates that capabilities to monitor calls, texts, and documents for undesirable content already exist or are being developed. Such a model could issue warnings, block actions, or report content, leading to technological modulation of social behavior. This poses a major threat to privacy and basic freedoms.

Read about designing technologies with values
https://blog.lukaszolejnik.com/designing-technologies-with-values-possibility-necessity-and-european-story/

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Is it possible to change the theme display on mastodon.social? I'd like to change the mastodon image to something else.

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

"The theft-prevention system installed in Seattle rental cars by a car-sharing company was designed to prevent cars being towed away by thieves. It disabled the cars remotely if they were detected to be moving with the engine off. Renters taking the boat ferry found themselves unable to restart their cars when the ferry docked. An anti-theft system in a car caused major delays to a regional ferry system" https://www.ft.com/content/178ab808-21ff-4ac2-a81f-f831326c22d4

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Germany recalled its ambassador to Russia for 'consultations in Berlin' following an alleged cyberattack on German political party. Such consequences as a result of a cyberattack happened for the first time in history (world scale). https://apnews.com/article/germany-russia-hacking-ambassador-3de67e3b5ff0aaa0162e1cad36cb7a0b

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Exaggerating the effects of foreign influence campaigns serves only the foreign operatives.

Downplaying the threat of foreign disinformation campaigns risks making it easier for bad actors to take advantage of an unprepared public.
Overstating the power of propaganda risks amplifying not only the original falsehood, but also an even more corrosive and polarizing narrative—that politicians are somehow remote-controlled, and that citizens don’t have agency.

https://www.foreignaffairs.com/russian-federation/dont-hype-disinformation-threat

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Official attributions of Russian cyber operations made by Germany, Czech Republic, USA, UK. Political parties and government institutions targeted by Russian military intelligence. Previously, Poland, Lithuania, Slovakia and Sweden were affected. I classify it as level 2 impact in my 4-level impact on States (https://blog.lukaszolejnik.com/cyber-escalation-ladder-model-based-on-international-law/). This IS a violation of cyber norms.

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Germany accuses Russia's military intelligence (GRU) of organising a cyber operation targeting German government party, the Social Democrats (SPD). That would be interference in domestic affairs, right? Germany speaks of "consequences".

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

SK Hynix high-bandwidth memory chip building capacity already almost fully booked (sold out) for 2024 and 2025. Strong demand for advanced chips used in AI computing. Meanwhile, cocoa prices continue to climb.

image/png

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Attention. The European Parliament passed a law on sharing health data with external entities. Allegedly only "pseudonymised" (anonymisation impossible), unclear how. Caution advised. Unfortunately data shared without consent. Opt-out is manual. https://www.europarl.europa.eu/doceo/document/TA-9-2024-0331_EN.pdf

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

On Thursday and Friday, two Finnair flights from Helsinki to the Estonian city of Tartu were forced by the GPS jamming to turn around and return to Finland as they were unable to navigate safely to their planned destination. https://www.ft.com/content/37776b16-0b92-4a23-9f90-199d45d955c3

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

UK Competition and Markets Authority asked Google to delay the phaseout of third-party cookies to early 2025, the soonest. This new report considers also data protection! Finally!
Some ad industry market participants argue that Privacy Sandbox goes beyond what is needed by legal requirements when it comes to data protection. They would prefer weaker stuff. Would you believe that?

https://assets.publishing.service.gov.uk/media/662baa3efee48e2ee6b81eb1/1._CMA_Q1_2024_update_report_on_Google_Privacy_Sandbox_commitments.pdf

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

In the 46-year-old Voyager 1, a processor failed, preventing data transmission. NASA devised a way to reallocate its functions to other hardware, sending an update 24.14 billion kilometers from Earth (taking 45 hours for round-trip communication). It works. https://blogs.nasa.gov/voyager/2024/04/22/nasas-voyager-1-resumes-sending-engineering-updates-to-earth/

LukaszOlejnik, to privacy
@LukaszOlejnik@mastodon.social avatar
LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

"US app stores will be banned from carrying TikTok in 270 days unless its Chinese owner sells the video-sharing platform". So just serve Progressive Web Application version to bypass the ban? :-) https://blog.lukaszolejnik.com/making-censorship-resilient-apps-with-progressive-web-applications/

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

U.S. crackdown on developers of spyware systems. "impose visa restrictions on 13 individuals who have been involved in the development and sale of commercial spyware or who are immediate family members of those involved" https://www.state.gov/promoting-accountability-for-the-misuse-of-commercial-spyware/

LukaszOlejnik, to Cybersecurity
@LukaszOlejnik@mastodon.social avatar

My book 'PROPAGANDA: from disinformation and influence to operations and information warfare' treats the subject adequately, comprehensively, broadly, expertly. Information surrounds us. How does information influence work? An expert arrangement of the subject. https://blog.lukaszolejnik.com/propaganda-my-book-on-information-security/

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

Russian cyber group infiltrated the systems of a hydroelectric dam in France and water utilities in the United States and Poland. Claims to tamper with industrial control settings. Sabotage attempt?

The aimed political effect of these cyber operators is evident.

It may be seen as crossing the threshold interference in internal affairs.

https://www.wired.com/story/cyber-army-of-russia-reborn-sandworm-us-cyberattacks/

https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf

image/png
image/png
image/png

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

My newsletter out. Weakened post-quantum LWE crypto. AI risk assessment goes out of the window. https://techletters.substack.com/p/techletters-173-weakened-post-quantum

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • GTA5RPClips
  • thenastyranch
  • ethstaker
  • everett
  • Durango
  • rosin
  • InstantRegret
  • DreamBathrooms
  • magazineikmin
  • Youngstown
  • mdbf
  • slotface
  • tacticalgear
  • JUstTest
  • kavyap
  • modclub
  • cisconetworking
  • cubers
  • ngwrru68w68
  • khanakhh
  • tester
  • anitta
  • normalnudes
  • Leos
  • osvaldo12
  • provamag3
  • lostlight
  • All magazines