Whitney Merrill(@wbm312) 's Twitter Profileg
Whitney Merrill

@wbm312

DPO. Privacy/infosec lawyer. Hacker. Fighting for privacy, digital civil liberties & the users. Ex @EA @FTC |views=own| Also at @[email protected]

ID:180493678

linkhttps://whitneymerrill.com/ calendar_today19-08-2010 19:33:46

36,1K Tweets

31,0K Followers

1,9K Following

Elizabeth Goitein(@LizaGoitein) 's Twitter Profile Photo

I’m not kidding. The bill actually does that. If you have any doubts, read this post by a FISA Court amicus, who took the unusual step of going public to voice his concerns. Too bad members of the House didn’t listen. 7/14 zwillgen.com/law-enforcemen…

account_circle
Elizabeth Goitein(@LizaGoitein) 's Twitter Profile Photo

That’s bad enough. But the House also voted for the amendment many of us have been calling “Patriot Act 2.0.” This will force ordinary American businesses that provide wifi to their customers to give the NSA access to their wifi equipment to conduct 702 surveillance. 6/14

account_circle
Elizabeth Goitein(@LizaGoitein) 's Twitter Profile Photo

I’m sad—and frankly baffled—to report that the House voted today to reward the government’s widespread abuses of Section 702 by massively expanding the government’s powers to conduct warrantless surveillance. 1/14

account_circle
WIRED(@WIRED) 's Twitter Profile Photo

NEW: Change Healthcare ransomware hackers already received a $22 million payment. Now a second group is demanding money, and has sent WIRED samples of what they claim is the company's stolen data. wired.trib.al/IrBhVDI

account_circle
Whitney Merrill(@wbm312) 's Twitter Profile Photo

Twitter.

X automatically changed 'Twitter' to 'X' in users' posts, breaking legit URLs mashable.com/article/twitte…

account_circle
EPIC(@EPICprivacy) 's Twitter Profile Photo

As we noted in our earlier thread, RISAA—the FISA Section 702 “compromise” bill, does not meaningfully reform the authority. Even worse, HPSCI wants to expand Section 702 surveillance in some deeply troubling ways. (1/x)
x.com/EPICprivacy/st…

account_circle
Wyatt Walls(@lefthanddraft) 's Twitter Profile Photo

If you are using LLMs for summarizing long docs, you really should read this paper

Over 50% of book summaries (incl by Claude Opus and GPT-4) were identified as containing factual errors and errors of omission

Lesson: don't blindly assume AI summarization tools work. Test them.

If you are using LLMs for summarizing long docs, you really should read this paper Over 50% of book summaries (incl by Claude Opus and GPT-4) were identified as containing factual errors and errors of omission Lesson: don't blindly assume AI summarization tools work. Test them.
account_circle
FTC(@FTC) 's Twitter Profile Photo

The FTC selected winners from its Voice Cloning Challenge to promote the development of ideas to protect consumers from the misuse of AI-enabled voice cloning for fraud and other harms: bit.ly/3VLq5GH /1

account_circle
Weld Pond | Chris Wysopal(@WeldPond) 's Twitter Profile Photo

This is the vulnerability that started the discussion of open source risk to commercial software. It eventually led to SBOMs and more vendor transparency.

account_circle