Grimes and Chelsea Manning Have Reportedly Broken Up – The Cut

Photo-Illustration: The Cut; Photos: Getty Images

After four months of dating, this years most unexpected couple has reportedly come to an end: A source tells Page Six that Grimes and whistleblower Chelsea Manning have broken up and had been breaking up for a while.

In case you forgot Grimes and Manning were even together, heres a catch-up: Reports that the pair were dating broke in March, shortly after Grimes revealed that she had a secret second baby and then broke up with her on-again, off-again partner, Elon Musk.After tweeting at each other for months, Grimes and Mannings relationship seemed to move quickly, with sources telling Page Six this spring that they were getting serious and had U-Hauled it, which apparently meantliving together in Austin, though Manning who spent years in a military prison for leaking government documents to WikiLeaks in 2010 also reportedly kept her apartment in Brooklyn.

Neither Grimes nor Manning has commented on the breakup. Manning, who has a memoir coming out in October, has previously said she prefers to keep my private life private.Grimes, meanwhile, is reportedly back on the dating scene, which probably means we have even more unexpected pairings to look forward to.

Get the Cut newsletter delivered daily

By submitting your email, you agree to our Terms and Privacy Notice and to receive email correspondence from us.

Go here to read the rest:
Grimes and Chelsea Manning Have Reportedly Broken Up - The Cut

CP/M’s open-source status clarified after 21 years – The Register

The company that still owns Digital Research's CP/M operating system has granted a new, more permissive license for the eight-bit OS, making it free for anyone to modify or redistribute.

It's not often that we update a news story from 21 years ago. Bryan Sparks, then CEO of Caldera spin-off Lineo, gave Tim Olstead permission to redistribute the OS, both as source and binaries. Sadly, Mr. Olstead passed away from cancer aged just 51. Back then, we wrote that the Unofficial CP/M Web Site was back, as Mr. Sparks changed the permissions from the former owner himself to the site as a whole.

For clarity, that's a very good thing Lineo was under no obligation to do this but restricting redistribution to one person or one site was limiting.

Lineo in turn spun off DRDOS, Inc., which ended up owning the Digital Research intellectual property. That company is still around, and Mr Sparks is its president. This month, retired programmer Scott Chapman managed to contact Sparks and request clarification of whether anyone else was allowed to redistribute CP/M, and Sparks has granted free rein.

You can now legally run the raw unbridled power of CP/M 2.2 anywhere you like

As we reported in 2014, the source code is easy enough to find: the Computer History Museum makes several versions available. The new license just permits developers to do more with it.

What prompted this is that the restrictions of the 2001 agreement have already brought about the creation of an ingenious workaround called CP/Mish by retrocomputing boffin David Given, known to Youtubers as Hjalfi.

Given cleverly exploited CP/M's modularity. Back in the day, so many replacement parts for various elements of CP/M were published that it was possible to build a complete OS without using any Digital Research code. CP/Mish's BDOS (loosely, its "kernel") is ZSDOS, its command prompt is ZCPR, and there are some other parts to glue it all together, as he documents on GitHub.

(UNIX graybeardy types might be reminded of 4.4BSD-Lite at this point. And if you remember 4.4BSD, we're sorry, but you're a graybeard even if you don't actually have a beard.)

Now, thanks to the new license, Given can legally integrate actual DR code into CP/Mish. Soon we can look forward to a significantly improved OS for the Amstrad NC200 laptop, the Kaypro II, and several models of Brother word-processor.

CP/Mish isn't the only modern CP/M-alike. Due to its tiny size and extreme simplicity, these days it's fairly straightforward to hand-build your own Z80 computer from parts on a breadboard, or from a kit, of which the RC2014 is a popular example. The RC2014 can run several ROMs and OSes, including RomWBW, which allows you to boot a choice of CP/M relatives: CP/M 2.2, ZSDOS 1.1, NZCOM, CP/M 3, and ZPM3, among others.

A 21st century CP/M computer, the RC2014 Pro (Credit: z80kits.com)

If hand-soldering even a small computer together sounds too daunting, there's RunCPM, which can run CP/M and its apps on Windows, Linux or macOS. A standalone computer is more fun, though, and thanks to FabGL, RunCPM can run on the ESP32 from Expressif. That means you can turn several tiny, cheap development boards into self-contained CP/M computers a good ready-to-use example is Lilygo's TTGO VGA32, which has two PS/2 ports, VGA and headphone sockets, and a microSD slot, and costs about $22. Guido Lehwalder offers instructions to get one going.

The Spectrum Next also runs CP/M, if you're lucky enough to have one. This vulture is still waiting for his to arrive, and is considering an N-GO in the interim.

CP/M first appeared in 1974, only one year after the first version of UNIX written in C. The difference is that even then, UNIX was rather complex, whereas CP/M is tiny. Twenty years later, Dave Baldwin offered an eloquent explanation of why that makes it interesting. There are reams of information about it online, and John Elliott's encyclopedic page is a great place to start.

Youtube Video

We are aware that CP/M isn't just a Z80 OS and also ran on the Intel 8080. True, it did, but many of the third-party extensions and software use the extra Z80 opcodes. More importantly, multiple Z80 variants are still in production, so all the modern hobbyist kit that we've seen so far uses Zilog-family chips. This includes the Z180, and even the 16-bit Z280 for example, the ZZ80MB, and the ZZ80RC, which slots into an RC2014 backplane.

Read more from the original source:

CP/M's open-source status clarified after 21 years - The Register

Space Runs on Open Source Software. The US Air Force Is Fine With That – Defense One

Cookie List

A cookie is a small piece of data (text file) that a website when visited by a user asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies which are cookies from a domain different than the domain of the website you are visiting for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a sale of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit http://www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a sale of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit http://www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a sale of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit http://www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated sale of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated sale of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated sale of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Read more from the original source:

Space Runs on Open Source Software. The US Air Force Is Fine With That - Defense One

Pixel Pump is an open-source, manual pick-and-place machine (Crowdfunding) – CNX Software

Pixel Pump is an open-source hardware vacuum pump that should be easier to use than a pair of tweezers to pick and place SMT components, and suitable for prototypes and small production runs.

The system comes with a pen with five exchangeable stainless-steel nozzles to match the size of components, a foot pedal, and several tactile silicone buttons with RGB backlighting to control the unit.

The button on the unit (customized parts bought from Alibaba) allows you to change operation modes, switch between high- and low-power settings, or activate reverse mode to clean your nozzle. Its also possible to configure vacuum power and LED brightness with the buttons. The foot pedal is used to control the vacuum pump to pick up and release the components. A serviceable air filter is also integrated into the design to protect the vacuum pump and valves from debris.

Robin Reiter, Pixel Pumps designer, explains it can actually be faster than an automated pick-and-place machine for smaller batch sizes, especially when combined with custom-designed SMD magazines. Those magazines are injection-molded containers for SMD tapes with a spring-loaded mechanism, and eight of them can be stored in a magazine rail for convenience.

If you want to further boost your productivity you could add an additional pedal working with the interactive HTML BOM generation plugin for KiCad to scroll through the BoM after youve placed specific components. That would mean the left pedal controls the pump, and the right pedal the HTML table. Its best to see everything in action to better understand how well this works, and how it could save you time.

Weve talked about the Pixel Pump being open-source, and Robin says our source code, STL files, and schematics will be publicly available on GitHub once the campaign has gone live. But theres limited information on Hackaday.io at this time, however, I could find the main board design files (based on Raspberry Pi RP2040 MCU) and MicroPython firmware on Github, but not the 3D files for the enclosure yet.

The Pixel Pump has recently launched on Crowd Supply with a $32,000 funding target. Rewards start at $449 for the Pixel Pump only, but you may want to add an 8-magazine pack ($36), an SMD-magazine rail ($36), and a second pedal ($55) to make the best use of the tool. Shipping adds $8 to the US, and $18 to the rest of the world, and backers should expect their perks to ship by mid-January 2023 if everything does according to plans.

Jean-Luc started CNX Software in 2010 as a part-time endeavor, before quitting his job as a software engineering manager, and starting to write daily news, and reviews full time later in 2011.

View post:

Pixel Pump is an open-source, manual pick-and-place machine (Crowdfunding) - CNX Software

Researchers open-source neural network with 117B parameters – SiliconANGLE News

A group of researchers today released Bloom, an advanced natural language processing model that features 117 billion parameters.

The researchers have made the code for Bloom available under an open-source license.

The project began last year as collaboration between Hugging Face Inc., an artificial intelligence startup that recently raised $100 million from investors, and two supercomputing organizations in France. Hugging Face and its partners formed a research group called BigScience to lead the development of Bloom. More than 1,000 researchers from more than 70 countries participated in the effort.

Bloom supports 46 languages and 13 programming languages, BigScience researchers wrote in a blog post today. The AI can answer questions, summarize text, extract snippets of information from documents and perform a variety of other tasks. Blooms versatility is partly the result of the fact that it features 117 billion parameters.

Parameters are the settings that determine how an AI goes about performing a computing task. The more such settings an AI system includes, the more advanced the tasks that its capable of performing. With 117 billion parameters, Bloom is one of the most sophisticated natural language processing models in the world.

Bloom features more parameters than the advanced GPT-3 neural network that OpenAI LLC detailed in 2020. Like Bloom, GPT-3 is optimized for natural language processing use cases. Its also capable of performing other tasks such as generating software code.

BigScience researchers trained Bloom using the Jean Zay supercomputer near Paris. The supercomputer, which includes AI-optimized graphics cards from Nvidia Corp., has a top speed of more than 28 petaflops. One petaflop equals a quadrillion calculations per second.

This is the culmination of a year of work involving over 1000 researchers from 70+ countries and 250+ institutions, leading to a final run of 117 days (March 11 July 6) training, BigScience researchers detailed today. The development effort was supported by a compute grant worth an estimated 3M from French research agencies CNRS and GENCI, they elaborated.

Alongside the code for Bloom, the BigScience research group open-sourced some of the technical data that was produced during the development process. Developers can run Bloom on their own hardware or access a hosted version of the AI through an application programming interface provided by BigScience.

In the future, the research group plans to develop a new version of Bloom with even more advanced capabilities. BigScience intends to add support for more languages and optimize the AI to make it easier to run on a companys own infrastructure. BigScience will also develop additional AI systems with more complex architectures than Bloom.

Link:

Researchers open-source neural network with 117B parameters - SiliconANGLE News

Report: Equitiesfirst Named as Mystery Debtor to Celsius, $439 Million Owed to Crypto Lender Bitcoin News – Bitcoin News

Ever since Celsius paused withdrawals on June 12, the company has been the focus of attention due to the lenders financial hardships. A month later, Celsius filed for bankruptcy in the U.S. by leveraging the Chapter 11 process. Two days after the bankruptcy filing, a report disclosed that two people familiar with the matter allege that the private lending platform that owes Celsius $439 million is Equitiesfirst.

During the last few weeks, bankruptcies, liquidations, and insolvencies have been a very hot topic in the crypto world. Three well known crypto companies have filed for bankruptcy protection which includes the digital currency exchange Voyager Digital, the crypto lender Celsius, and the crypto hedge fund Three Arrows Capital (3AC). Celsius filed for bankruptcy on July 13, 2022, or 31 days after the company froze withdrawals.

Prior to the bankruptcy filing in July, there was speculation during the second week of June that said Celsius had funds locked into specific decentralized finance (defi) protocols that needed immediate adjustment or significant collateral would be liquidated. A few days before Celsius filed for bankruptcy, the companys wallets reportedly transferred millions of usd coin (USDC) at different times to pay down loans in Compound and Aave.

When Celsius filed for bankruptcy protection, the filing detailed that Celsius was owed a large sum of funds. On July 15, the Financial Times (FT) reported that Equitiesfirst [has been] revealed as [the] mysterious debtor to troubled crypto firm Celsius. The report claims two people familiar with the matter disclosed that Equitiesfirst is the ostensible borrower that owes the crypto lender $439 million.

Founded in 2002, Equitiesfirst is an investment firm that specializes in long-term asset-backed financing, according to the companys website. While Equitiesfirst manages stocks, it has also been dealing with select cryptocurrencies since 2016. The managing director and head of Equitiesfirst Singapore, Johnny Heng, spoke about cryptocurrencies in April 2022.

We used to be pure equities, until some six years ago, we started to offer loans against cryptocurrency as well, and that activity has really taken off [in] the past year or two, Heng told hubbis.com in an interview. Speaking with FT, an Equitiesfirst spokesperson said: Equitiesfirst is in [an] ongoing conversation with our client and both parties have agreed to extend our obligations.

Meanwhile, celsius network (CEL) token investors tried to short squeeze the companys native token well before the company filed bankruptcy. However, after the bankruptcy filing, CEL slipped by 58% against the U.S. dollar before it rebounded. Statistics recorded on July 16, 2022, indicate that despite CELs market volatility, the crypto asset has gained more than 30% during the last 30 days.

What do you think about the report that says Equitiesfirst has been revealed as the mystery debtor that owes Celsius millions? Let us know what you think about this subject in the comments section below.

Jamie Redman is the News Lead at Bitcoin.com News and a financial tech journalist living in Florida. Redman has been an active member of the cryptocurrency community since 2011. He has a passion for Bitcoin, open-source code, and decentralized applications. Since September 2015, Redman has written more than 5,700 articles for Bitcoin.com News about the disruptive protocols emerging today.

Image Credits: Shutterstock, Pixabay, Wiki Commons

Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. Bitcoin.com does not provide investment, tax, legal, or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Read more:

Report: Equitiesfirst Named as Mystery Debtor to Celsius, $439 Million Owed to Crypto Lender Bitcoin News - Bitcoin News

Amazon Handed Ring Videos to Cops Without Warrants – WIRED

The websites you visit can reveal (almost) everything about you. If you are looking up health information, reading about trade unions, or researching details around certain types of crime, then you can potentially give away a huge amount of detail about yourself that a malicious actor could use against you. Researchers this week have detailed a new attack, using the webs basic functions, that can unmask anonymous users online. The hack uses common web browser featuresincluded in every major browserand CPU functions to analyze whether youre logged in to services such as Twitter or Facebook and subsequently identify you.

Elsewhere, we detailed how the Russian hacktivist group Killnet is attacking countries that backed Ukraine but arent directly involved in the war. Killnet has launched DDoS attacks against official government websites and businesses in Germany, the United States, Italy, Romania, Norway, and Lithuania in recent months. And its only one of the pro-Russian hacktivist groups causing chaos.

Weve also looked at a new privacy scandal in India where donors to nonprofit organizations have had their details and information handed to police without their consent. We also looked at the new Retbleed attack that can steal data from Intel and AMD chips. And we took stock of the ongoing January 6 committee hearingsand predicted whats to come.

But thats not all. Each week we round up the news that we didnt break or cover in-depth. Click on the headlines to read the full stories. And stay safe out there!

For years, Amazon-owned security camera firm Ring has been building relationships with law enforcement. By the start of 2021, Amazon had struck more than 2,000 partnerships with police and fire departments across the US, building out a huge surveillance network with officials being able to request videos to help with investigations. In the UK, Ring has partnered with police forces to give cameras away to local residents.

This week, Amazon admitted to handing police footage recorded on Ring cameras without their owners permission. As first reported by Politico, Ring has given law enforcement officials footage on at least 11 occasions this year. This is the first time the firm has admitted to passing on data without consent or a warrant. The move will raise further concerns over Rings cameras, which have been criticized by campaign groups and lawmakers for eroding peoples privacy and making surveillance technology ubiquitous. In response, Ring says it doesnt give anyone unfettered access to customer data or video but may hand over data without permission in emergency situations where there is imminent danger of death or serious harm to a person.

In 2017, the Vault 7 leaks exposed the CIAs most secretive and powerful hacking tools. Files published by WikiLeaks showed how the agency could hack Macs, your router, your TV, and a whole host of other devices. Investigators soon pointed the finger at Joshua Schulte, a hacker in the CIAs Operations Support Branch (OSB), which was responsible for finding exploits that could be used in the CIAs missions. Schulte has now been found guilty of leaking the Vault 7 files to Wikileaks and is potentially facing decades in prison. Following an earlier mistrial in 2018, Schulte was this week found guilty on all nine charges against him. Weeks ahead of his second trial, The New Yorker published this comprehensive feature exploring Schultes dark history and how the CIAs OSB operates.

Hackers linked to China, Iran, and North Korea have been targeting journalists and media outlets, according to new research from security firm Proofpoint. Alongside efforts to compromise the official accounts of members of the press, Proofpoint says, multiple Iranian hacking groups have posed as journalists and tried to trick people into handing over their online account details. The Iranian-linked group Charming Kitten has sent detailed interview requests to its potential hacking targets, and they have also tried to impersonate multiple Western news outlets. This social engineering tactic successfully exploits the human desire for recognition and is being leveraged by APT actors wishing to target academics and foreign policy experts worldwide, likely in an effort to gain access to sensitive information, Proofpoint says.

In any company or organization, items will go missing from time to time. Usually these are misplaced phones, security passes, and files occasionally being left at bus stops by mistake. Losing any of these things may open up security risks if devices are insecure or if sensitive information is made public. Less commonly lost are desktop computersunless youre the FBI. According to FBI records obtained by VICEs Motherboard, the agency lost 200 desktop machines between July and December 2021. Also lost, or in some cases stolen, were pieces of body armor and night-vision scopes.

Scams dont get much more elaborate than this. This week, police in India busted a fake Indian Premier League cricket tournament. A group of alleged scammers set up the fake league in the western Indian state of Gujarat and hired young men to play cricket matches, posing as professional teams while they livestreamed the matches for people to bet on. According to police, the group hired a fake commentator, created onscreen graphics showing real-time scores, and played crowd noises downloaded from the internet. To hide the fact that the matches took place on a farm instead of inside a large stadium, the videofeed only showed closeups of the action. Police said they caught the gang as a quarterfinal match was being played. Police believe the gang was potentially running multiple leagues and was planning to expand to a volleyball league, too. The match footage is worth watching.

Original post:

Amazon Handed Ring Videos to Cops Without Warrants - WIRED

What is Mike Lees TEAM Act and how would it reform Big Tech? | Opinion – Deseret News

Conservatives across the country have grown increasingly distrustful of large online platforms. From content suppression during COVID-19 to the deplatforming of Parler to large-scale data breaches, high-profile incidents have led many on the center-right to question Big Techs influence over our lives.

With Republicans poised to gain seats in Congress in November, lawmakers should be looking ahead to the 118th Congress to address constituents concerns with Big Tech platforms without giving the Biden administration overreaching authority. Utah GOP Sen. Mike Lees Tougher Enforcement Against Monopolies Act, also known as the TEAM Act, should be a rallying point for lawmakers.

America is facing a panoply of competition concerns, not just in Big Tech, but across the entire economy. We need a holistic approach that benefits all consumers in every industry, Lee said on the Senate floor when introducing the legislation. We need to deal with all the monopolists hurting competition. The TEAM Act avoids the black-and-white pronouncements of other legislative proposals and instead updates the mechanics of how the antitrust laws are applied to address the enforcement gaps of recent decades.

Indeed, the act takes a comprehensive approach to reforming federal antitrust laws to hold Big Tech and other companies accountable and to promote competition, while codifying the consumer welfare standard, which has been the foundational principle of American antitrust law for decades.

Federal Trade Commission Commissioner Christine Wilson outlined this principle at the George Mason Law Review Annual Antitrust Symposium in 2019. Under the consumer welfare standard, business conduct and mergers are evaluated to determine whether they harm consumers in any relevant market. Generally speaking, if consumers are not harmed, the antitrust agencies do not act, she said.

In order to determine if consumers are harmed by a business practice, antitrust enforcers at the FTC and Department of Justice use objective economic analyses to identify actual or potential harms. They then conduct a cost-benefit analysis to determine whether the benefits of the business practice outweigh the harms to consumers. Finally, when the harms are determined to outweigh the benefits, antitrust enforcers seek legal remedies to correct the markets in question and punish offenders.

While antitrust enforcers can consider other market effects, consumer welfare is their north star.

It is clear that there are some instances where Big Techs business practices harm consumers. In fact, the FTC has taken dozens of actions against tech companies like Google, Twitter and Facebook for privacy violations. Most recently, the FTC filed suit against Facebook (now Meta) alleging that the company is illegally maintaining its personal social networking monopoly through a years-long course of anticompetitive conduct.All of these cases are based on the consumer welfare standard. In the case of Facebook, the FTCs revised complaint argues that the primary harm of Facebooks monopoly is that it deprives users of personal social networking in the United States of the benefits of competition, including increased choice, quality and innovation.

In many instances, antitrust law already offers a way for the government to step in and correct markets gone awry. Unfortunately, the advent of new business models like those of free online services makes antitrust enforcement more difficult than it is for traditional markets. Historically, one of the best methods used by antitrust enforcers to demonstrate consumer harm has been examining the cost of goods and services. But this calculus becomes more complex (if not impossible) when examining a free service like Facebook or Google Search.

To address these challenges, the TEAM Act would, among other things, codify the consumer welfare standard that currently only exists as a product of case law. This would clarify that courts can only consider consumer harms like price, quality of products, reduced choice and impact on innovation. Furthermore, it would specify that courts can only consider benefits that are in-market and likely to benefit consumers. Introducing such clarifications into statute should make it easier for antitrust enforcers to bring cases while weeding out frivolous enforcement actions not based in consumer welfare.

The TEAM Act is not perfect. Lawmakers should take steps to refine the legislation ahead of the next Congress. One issue that antitrust enforcers regularly face when handling online platforms and services is the question of market definition. For example, in its current case against Facebook, the FTC alleges that Facebook has effectively no competition in the market of personal social networking services. Facebook disagrees, arguing that it has lots of competition, including Snapchat, TikTok and other social media platforms. While case law will ultimately determine how certain markets should be defined, guidance from Congress could simultaneously aid enforcement agencies and simplify compliance.

With Congress now considering bills that would go much further in expanding the governments ability to regulate competition in ways that will have unintended consequences, lawmakers should consider prudent solutions to update existing antitrust laws to promote competition consistent with the principles of American law. Lees bill is a good place to start.

Luke Hogg is policy manager at the Lincoln Network, a nonprofit that focuses on the intersection of technological innovation and public policy.

Original post:

What is Mike Lees TEAM Act and how would it reform Big Tech? | Opinion - Deseret News

Amid fears of election subversion, DeSantis’ handpicked secretary of state will oversee his race – Salon

Democrats and election experts have sounded the alarm for months about the growing risk of election subversion as conspiracy theorists backed by former President Donald Trump run for secretary of state in key swing states. But with little fanfare or media attention, Florida Gov. Ron DeSantis earlier this year hand-picked a right-wing ally who refuses to acknowledge President Joe Biden's 2020 victory to oversee his re-election race.

Around the country, Republicans pushing Trump's "Big Lie" about the 2020 election are running to win jobs overseeing the next election. Trump loyalist Jim Marchant, who baselessly claims that elections have been illegitimate for more than a decade, recently won the Republican nomination for secretary of state in Nevada. The Michigan Republican Party is backing Kristina Karamo, who has pushed ludicrous conspiracy theories about the 2020 race being stolen. Trump has also endorsed Mark Finchem as Arizona's next secretary of state after he attended the Jan. 6 Capitol rally and introduced a bill to decertify 2020 election results.

But Florida, like Texas, allows the governor to appoint the state's election chief. After Secretary of State Laurel Lee resigned to run for a U.S. House seat this spring, DeSantis simply handed his right-wing ally the job.

DeSantis in May appointed controversial state Rep. Cord Byrd to oversee elections in the state, touting him as an "ally of freedom and democracy." DeSantis won his first election by less than half a percentage point against Democrat Andrew Gillum, the former mayor of Tallahassee.

"I look forward to his successes ensuring Florida's elections remain safe, secure and well-administered," DeSantis said in a statement. A news release from DeSantis' office praised Byrd as "a staunch advocate for election security, public integrity, the fight against big tech censorship and the de-platforming of political candidates."

In his own statement, Byrd vowed to ensure that "Florida continues to have secure elections and that we protect the freedom of our citizens in the face of big-tech censorship and ever-growing cybersecurity threats."

Byrd has refused to acknowledge Biden's win over Trump, citing unspecified "irregularities" in the 2020 election.

"He was certified as the president. He is the president of the United States," Byrd said after he was appointed. "There were irregularities in certain states. I'm not the secretary of state of Wisconsin or Pennsylvania or Arizona. That's up to their voters. We in Florida had a successful election in 2020. And that's what I want to continue to have in 2022."

There is no evidence of any issues in the states Byrd cited that may have improperly swayed the election.

Byrd said Florida's election was "successful and accurate" but added that "we also know that people want to interfere and sow chaos," defending a spate of new voting restrictions, some of which a federal judge later ruled unconstitutional because they disenfranchised Black voters.

Byrd and his wife Esther, who was appointed by DeSantis to the State Board of Education, quit Twitter last year after she tweeted about "the coming civil wars" during the Capitol riot.

"In the coming civil wars (We the People vs the Radical Left and We the People cleaning up the Republican Party), team rosters are being filled. Every elected official in DC will pick one. There are only 2 teams With Us [or] Against Us," Esther Byrd tweeted as the Capitol was under siege. "We the People will NOT forget!"

She also appeared to defend the rioters in another post she wrote on Facebook.

"ANTIFA and BLM can burn and loot buildings and violently attack police and citizens," she wrote, according to Florida Politics. "But when Trump supporters peacefully protest, suddenly 'Law and Order' is all they can talk about! I can't even listen to these idiots bellyaching about solving our differences without violence."

She also made "comments supportive of QAnon after the couple was photographed on a boat flying a QAnon flag," the outlet reported.

Cord Byrd dismissed criticism of his wife's comments last year, arguing that "people talk about civil wars in the Republican party."

"There are factions. People believe different things. It was a figure of speech and that's how it was intended," he told WJXT-TV.

Want a daily wrap-up of all the news and commentary Salon has to offer? Subscribe to our morning newsletter, Crash Course.

Byrd, who will ultimately require confirmation by the Republican-led state Senate, will oversee the state's upcoming elections and the implementation of its new voting restrictions, including the creation of a new office in the Department of State to investigate allegations of irregularities. Democrats have pushed to hold confirmation hearings but have been ignored by Republican leaders.

While serving in the state House, Byrd co-sponsored the voting restrictions legislation and several other controversial bills, including a 2021 measure that imposed stiff criminal penalties in protests that turn violent after mass demonstrations following the Minneapolis police killing of George Floyd.

"We can act before it's too late. We do not need to have Miami or Orlando or Jacksonville become Kenosha or Seattle or Portland," Byrd said at the time. "We have the ability under House Bill 1 to act now to say you can protest peaceably but you cannot commit acts of violence, you cannot harm other people, you cannot destroy their property, you cannot destroy their lives."

Byrd also co-sponsored Florida's controversial "Don't Say Gay" bill, a 15-week abortion ban, a bill to ban schools from discussing race, and anti-trans and anti-immigrant legislation, according to the ACLU of Florida. Byrd also supported DeSantis' congressional map, which was adopted by the legislature and subsequently challenged in court for reducing the number of majority-Black districts in the state.

"Our main concern around this office is that there is no guardrail to ensure that under any administration it couldn't become a political tool," Abelilah Skhir of the ACLU of Florida told NPR.

During a debate on the state's 15-week abortion ban, Byrd clashed with Black lawmakers on the House floor, calling them "fucking idiots," according to the Orlando Sentinel.

State Rep. Angie Nixon said at the time that she was "disgusted" by Byrd's behavior.

"Byrd is unhinged," she tweeted, accusing him of "antagonizing and cussing at Black Caucus members." He "clearly has biases & lacks composure," she wrote.

Byrd's office later denied the report.

After Byrd's appointment, Nixon slammed DeSantis' choice, arguing that the top election official "should be a consensus builder whose sole focus is running free and fair elections for every citizen of our state."

"Cord Byrd is not that person," she said in a statement. "He is unqualified in both his credentials and his temperament, has proved time and again he will put partisanship ahead of good policy, and is unfit to lead the elections department of a diverse state of more than 20 million people."

Byrd said in a statement to NPR that he has "always advocated for the rule of law, and now serving as Florida's Secretary of State, that will not change."

The secretary of state's office said the allegations that Byrd would politicize the department "are simply not true and have been repeatedly addressed."

"This is a false narrative that appears to be perpetuated by inaccurate or incomplete news stories and by partisan political attacks," the office said. "The Secretary of State's office is nonpartisan and will not respond to those allegations."

DeSantis defended Byrd during a press conference in May, touting him as a champion of "election integrity."

"We are not going to have to worry in Florida about Zuckerbucks infiltrating our elections with Cord as secretary of state," the governor said, echoing a litany of election conspiracy theories. "We're not going to have to worry about ballot harvesting with Cord as secretary of state. We're going to make sure that the elections are run efficiently and transparently. But we are not going to allow these external influences to come in and to corrupt the operations. And we're certainly not going to allow political operatives to harvest all these votes, and then dump them somewhere."

So far, Democratic calls for a state Senate vote on Byrd's confirmation have fallen on deaf ears. State Sen. Randolph Bracy, a Democrat, said in a statement that Byrd "must be thoroughly vetted and confirmed by the full Senate body before he is able to preside over the upcoming midterm elections.

"He is taking over at a critical juncture and will be the first to oversee a new election security force which has unprecedented authority to hunt election and voting violations," Bracy said.

State Rep. Carlos Smith, a fellow Democrat, said Byrd may be DeSantis' "most frightening appointment to date."

"Florida now has a QAnon conspiracy theorist and promoter of the big lie overseeing our state elections and DeSantis' election police," he said. "We need a Secretary of State whose top priority is free and fair elections, not a hyper-partisan GOP loyalist who takes orders from Ron DeSantis. Our right to vote is sacred and I worry about what this could mean for our democracy."

Democrats running to challenge DeSantis have already asked for the Justice Department to keep a close eye on the secretary of state's new election police, citing Byrd's involvement.

Rep. Charlie Crist, D-Fla., a former Florida governor (and former Republican) who is running for the office again, sent a letter to Attorney General Merrick Garland asking the Justice Department to "consider using all available authorities and resources to protect the rights of Florida voters."

Agriculture Commissioner Nikki Fried, another Democratic gubernatorial candidate, also cited Byrd when she asked the DOJ to keep tabs on the state.

"Due to these seriously concerning actions, it is imperative that the U.S. Department of Justice closely monitor the election-related actions of Florida officials and take appropriate federal action if necessary," she wrote, adding that the"collective measures" by DeSantis and the Florida legislature were "not isolated threats, but deliberate attempts to circumvent or override democratic norms. Discriminatory congressional maps, new voter suppression measures, and a Secretary of State with radical far-right views is a dangerous combination for Florida voters and the integrity of our elections."

Read more

about DeSantis' assault on voting

See the original post here:

Amid fears of election subversion, DeSantis' handpicked secretary of state will oversee his race - Salon

How aspiring influencers are forced to fight the algorithm – MIT Technology Review

There are two ways to try to understand the impact of content moderation and the algorithms that enforce those rules: by relying on what the platform says, and by asking creators themselves. In Tylers case, TikTok apologized and blamed an automatic filter that was set up to flag words associated with hate speechbut that was apparently unable to understand context.

Brooke Erin Duffy, an associate professor at Cornell University, teamed up with graduate student Colten Meisner to interview 30 creators on TikTok, Instagram, Twitch, YouTube, and Twitter around the time Tylers video went viral. They wanted to know how creators, particularly those from marginalized groups, navigate the algorithms and moderation practices of the platforms they use.

What they found: Creators invest a lot of labor in understanding the algorithms that shape their experiences and relationships on these platforms. Because many creators use multiple platforms, they must learn the hidden rules for each one. Some creators adapt their entire approach to producing and promoting content in response to the algorithmic and moderation biases they encounter.

Below is our conversation with Duffy about her forthcoming research (edited and condensed for clarity).

Creators have long discussed how algorithms and moderation affect their visibility on the platforms that made them famous. So what most surprised you while doing these interviews?

We had a sense that creators experiences are shaped by their understanding of the algorithm, but after doing the interviews, we really started to see how profound [this impact] is in their everyday lives and work the amount of time, energy, and attention they devote to learning about these algorithms, investing in them. They have this kind of critical awareness that these algorithms are understood to be uneven. Despite that, theyre still investing all of this energy in hopes of understanding them. It just really draws attention to the lopsided nature of the creator economy.

How often are creators thinking about the possibility of being censored or having their content not reach their audience because of algorithmic suppression or moderation practices?

I think it fundamentally structures their content creation process and also their content promotion process. These algorithms change at whim; theres no insight. Theres no direct communication from the platforms, in many cases. And this completely, fundamentally impacts not just your experience, but your income.

Follow this link:

How aspiring influencers are forced to fight the algorithm - MIT Technology Review