Whitney Merrill(@wbm312) 's Twitter Profileg
Whitney Merrill

@wbm312

DPO. Privacy/infosec lawyer. Hacker. Fighting for privacy, digital civil liberties & the users. Ex @EA @FTC |views=own| Also at @[email protected]

ID:180493678

linkhttps://whitneymerrill.com/ calendar_today19-08-2010 19:33:46

36,2K Tweets

31,0K Followers

1,9K Following

Follow People
Elizabeth Goitein(@LizaGoitein) 's Twitter Profile Photo

Iā€™m not kidding. The bill actually does that. If you have any doubts, read this post by a FISA Court amicus, who took the unusual step of going public to voice his concerns. Too bad members of the House didnā€™t listen. 7/14 zwillgen.com/law-enforcemenā€¦

account_circle
Elizabeth Goitein(@LizaGoitein) 's Twitter Profile Photo

Thatā€™s bad enough. But the House also voted for the amendment many of us have been calling ā€œPatriot Act 2.0.ā€ This will force ordinary American businesses that provide wifi to their customers to give the NSA access to their wifi equipment to conduct 702 surveillance. 6/14

account_circle
Elizabeth Goitein(@LizaGoitein) 's Twitter Profile Photo

Iā€™m sadā€”and frankly baffledā€”to report that the House voted today to reward the governmentā€™s widespread abuses of Section 702 by massively expanding the governmentā€™s powers to conduct warrantless surveillance. 1/14

account_circle
WIRED(@WIRED) 's Twitter Profile Photo

NEW: Change Healthcare ransomware hackers already received a $22 million payment. Now a second group is demanding money, and has sent WIRED samples of what they claim is the company's stolen data. wired.trib.al/IrBhVDI

account_circle
Whitney Merrill(@wbm312) 's Twitter Profile Photo

Twitter.

X automatically changed 'Twitter' to 'X' in users' posts, breaking legit URLs mashable.com/article/twitteā€¦

account_circle
EPIC(@EPICprivacy) 's Twitter Profile Photo

As we noted in our earlier thread, RISAAā€”the FISA Section 702 ā€œcompromiseā€ bill, does not meaningfully reform the authority. Even worse, HPSCI wants to expand Section 702 surveillance in some deeply troubling ways. (1/x)
x.com/EPICprivacy/stā€¦

account_circle
Wyatt Walls(@lefthanddraft) 's Twitter Profile Photo

If you are using LLMs for summarizing long docs, you really should read this paper

Over 50% of book summaries (incl by Claude Opus and GPT-4) were identified as containing factual errors and errors of omission

Lesson: don't blindly assume AI summarization tools work. Test them.

If you are using LLMs for summarizing long docs, you really should read this paper Over 50% of book summaries (incl by Claude Opus and GPT-4) were identified as containing factual errors and errors of omission Lesson: don't blindly assume AI summarization tools work. Test them.
account_circle
FTC(@FTC) 's Twitter Profile Photo

The FTC selected winners from its Voice Cloning Challenge to promote the development of ideas to protect consumers from the misuse of AI-enabled voice cloning for fraud and other harms: bit.ly/3VLq5GH /1

account_circle
Weld Pond | Chris Wysopal(@WeldPond) 's Twitter Profile Photo

This is the vulnerability that started the discussion of open source risk to commercial software. It eventually led to SBOMs and more vendor transparency.

account_circle