Recode Daily: High-profile Theranos CEO Elizabeth Holmes has been charged with fraud by the SEC
- March Madness 2018: How to stream the NCAA tournament live.
- All 67 games start streaming today.
- Twitter stock is up on a bunch of news we already knew about.
- The stock finished the day up more than 7 percent.
- Facebook finally suspended the anti-Muslim political group that President Trump retweeted last year.
- Britain First shared posts “designed to incite animosity and hated against minority groups,” Facebook says.
- Greylock investor Josh Elman is joining Robinhood, the stock-trading app, as its new product chief.
- Credit Karma has acquired Penny, an instant message bot that helps people track their spending.
- The $3 billion continues to expand beyond its credit roots.
- Sign up for our Recode Daily newsletter to get the top tech and business news stories delivered to your inbox.
An analysis of logic flaws in web-of-trust services
- WOT services allow users to create tokens and place them on their personal pages (e.g. GitHub profile).
- On the web a lot of profile-based applications allow redistribution of content by sharing someone else's entry on your personal timeline — on Twitter users can retweet content and on GitHub people can fork projects.
- Since some WOT services use a public entry or post to verify the user's identity, I asked myself whether it would be possible to claim ownership of someone else's account by having them share a token that was posted onto an attacker's timeline.
- One particular service stood out for me, GitHub, where WOT applications such as Keybase require users to place the verification token into a GitHub gist file.
- This next attack consisted of using a verification token generated for liberapay.org* embedded on liberapay*.com* to claim ownership of liberapay*.org.
EasyEmail is autocomplete for Gmail
- EasyEmail, emerging from Y Combinator’s latest batch, is aiming to get inside your inbox and help you navigate future messages using the past as a guide with an autocomplete-like feature.
- After downloading the Chrome plugin, the service spends 10-20 minutes pouring through your sent messages and building up a good idea of how you write emails.
- What may be more useful to a broader base of users is how the plugin lets users define hotkeys and bring up oft copy-pasted bio info or links into the body of their emails without the pain of searching for the info over and over again.
- Depending on how you use it, the plugin is a lightweight add-on that could save you a load of time navigating the minutiae of sending tons of emails.
Comparison of machine learning techniques in email spam detection
- This report compares the performance of three machine learning techniques for spam detection including Random Forest (RF), k-Nearest Neighbours (kNN) and Support Vector Machines (SVM).
- The idea of automatically classifying spam and non-spam emails by applying machine learning methods has been popular in academia and has been a topic of interest for many researchers.
- This comparison is a real-time process, and therefore the main drawback of this approach is that the kNN algorithm must compute the distance and sort all the training data for each prediction, which can be slow if given a large training dataset (James, Witten, Hastie, & Tibshirani, 2013, pp.
- We determine from the results that k-Nearest Neighbours (kNN) and Support Vector Machine (SVM) perform similar weak regarding accuracy and Random Forest (RF) outperforms both.
- Therefore due to its design Random Forest performs relatively well "out-of-the-box" compared to k-Nearest Neighbours and Support Vector Machine.
The tiny red dots taking over our lives
- As touch-screen phones careered toward ubiquity, and as desktop interfaces and website design and mobile operating systems huddled together around a crude and adapting set of visual metaphors, the badge was ascendant.
- On social media, in apps and on websites, badge design was more creative, appearing as little speech bubbles or as rectangles.
- What’s so powerful about the dots is that until we investigate them, they could signify anything: a career-altering email; a reminder that Winter Sales End Soon; a match, a date, a “we need to talk.” The same badge might lead to word that Grandma’s in the hospital or that, according to a prerecorded voice, the home-security system you don’t own is in urgent need of attention or that, for the 51st time today, someone has posted in the group chat.
How to encrypt your text messages for private conversations on iPhone and Android
- If you want to send messages without worrying that other people might be poking around in the texts you're sending, you should be using an encrypted messaging service.
- If you're on an iPhone and texting to someone who also has an iPhone, your messages are already going to be secure thanks to the encryption keys Apple already keeps in iMessage.
- On Android, you can even set it to be the default messaging app (though again, you'll want to make sure you're sending messages to someone who's also using Signal to ensure encryption.) When you send a message to someone without Signal, it will ask you to invite that person to use the app.
- Finally, Signal shows you the "safety" number that you can compare with the person you're chatting to to make sure that the conversation is secure.
Writing a Microservice in Rust
- With microservice, I mean an application that speaks HTTP, accepts requests, speaks to a database, returns a response (possibly serving HTML), packaged up in a Docker container and ready to be dropped somewhere in the cloud.
- Since we’re building a chat application, the two kinds of requests we’ll want to handle are POST requests, with form data containing the user’s name and the message, and GET requests with optional before and after parameters to filter by time.
- We’ll accept POST requests to our service’s root path ("/") and expect them to contain a username and message field in their form data.
- In such a case, parse_query will return an error message, which we can forward to the make_error_response function we wrote earlier.
- If the messages option contains a value, we can pass the messages on to render_page, which will return an HTML page that forms the body of our response, showing the messages in a simple HTML list.
World's Oldest Message in a Bottle Found on Beach
- Later, they would learn that the 8-inch by 6-inch slip of paper was the world's oldest message in a bottle to date.
- But two days after the find, they reached out to the Western Australian Museum, where they met Ross Anderson, the assistant curator of maritime archaeology.
- Anderson cross-referenced the dark text on the aged, cheaply made slip of paper with handwriting samples from captain's entries and determined that the message was dated June 12, 1886.
- He adds the bottle had been thrown overboard from the German sailing ship Paula as it crossed the Indian Ocean on a journey from Cardiff, Wales, to the present-day Indonesia.
- During this time, German crews were conducting a 69-year experiment that required them to toss thousands of bottles overboard to investigate global ocean currents.
- The Illman family have since loaned their find to the Western Australian Museum until 2020.
Facebook’s next money-maker: Messenger Broadcasts
- Users might hate it, but Facebook is now testing a self-serve sponsored messaging tool for small businesses that aren’t sophisticated enough to build bots.
- TechCrunch first reported back in November Facebook internally building a prototype of the Messenger Broadcast tool that let companies blast a message to anyone who’s already started a conversation with them.
- But with display ads injected into the inbox, sponsored message ads from big brands and now Messenger Broadcasts, Facebook risks its chat app becoming our new spam folder.
- Using the Messenger Broadcast Composer, small businesses with no coding skills can choose a subset of people who’ve messaged them to hit with a text blast.
- “But we got feedback from small businesses that they don’t have the know-how or the tech resources to build experiences on the Messenger Platform (bots) that would enable them to reach their entire audience,” a Facebook spokesperson tells me.
This beautifully designed 'dumb phone' can only make calls and send texts — and it might be the key to curing our addiction to apps
- Light intended the phone to be something of a companion to your smartphone and a way to get people to leave their phones at home and go enjoy life.
- The Light Phone 2 will be able to manage some of the key tasks that keep us connected — calling, messaging, and getting directions — while eliminating time-wasters like social media apps and games.
- Hollier and Tang designed the phone as something of a security blanket for smartphone users — you could leave your smartphone at home and "go light" using only the Light Phone.
- But the Light Phone 2 can send and receive text messages, which will likely make it more enticing for users who are afraid to completely give up their smartphones.
- You could set up call forwarding through Light's computer app, then leave your smartphone at home for short periods of time.