<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>PaulSpoerry.com</title>
	<atom:link href="https://www.paulspoerry.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.paulspoerry.com</link>
	<description>Social Media, technology, and geeky stuff for your brain.</description>
	<lastBuildDate>Fri, 10 Dec 2021 18:52:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>A huge study of 20 years of global wealth demolishes the myth of ‘trickle-down’ and shows the rich are taking most of the gains for themselves</title>
		<link>https://www.paulspoerry.com/2021/a-huge-study-of-20-years-of-global-wealth-demolishes-the-myth-of-trickle-down-and-shows-the-rich-are-taking-most-of-the-gains-for-themselves/</link>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Fri, 10 Dec 2021 18:52:04 +0000</pubDate>
				<category><![CDATA[GuestPost]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17862</guid>

					<description><![CDATA[It&#8217;s no secret there&#8217;s inequality across the economy, but a huge new report shows just how much. The 2022 World Inequality Report demolishes the myth that tax cuts for the rich will trickle down. The bottom half of the global population holds just 2% of all wealth, while the top 10% earns 76%. Inequality has [&#8230;]]]></description>
										<content:encoded><![CDATA[
<ul><li>It&#8217;s no secret there&#8217;s inequality across the economy, but a huge new report shows just how much.</li><li>The 2022 World Inequality Report demolishes the myth that tax cuts for the rich will trickle down.</li><li>The bottom half of the global population holds just 2% of all wealth, while the top 10% earns 76%.</li></ul>



<p>Inequality has remained persistently high for decades, and a new report shows just how stark the divide is between the richest and poorest people on the planet.&nbsp;</p>



<p>The 2022&nbsp;<a href="https://wir2022.wid.world/">World Inequality Report</a>, a huge undertaking coordinated by economic and inequality experts Lucas Chancel, Thomas Piketty, Emmanuel Saez, and Gabriel Zucman, was the product of four years of research and produced an unprecedented data set on just how wealth is distributed.</p>



<p>&#8220;The world is marked by a very high level of income inequality and an extreme level of wealth inequality,&#8221; the authors wrote.&nbsp;</p>



<p>The data serves as a complete rebuke of the trickle-down economic theory, which posits that cutting taxes on the rich will &#8220;trickle down&#8221; to those below, with the cuts eventually benefiting everyone. In America, trickle-down was exemplified by <a href="https://www.npr.org/2011/09/21/140662014/new-republic-how-did-trickle-down-get-acceptable">President Ronald Reagan&#8217;s</a> tax slashes. It&#8217;s a theory that <a href="https://www.businessinsider.com/democrats-want-end-reagonomics-trickle-down-infrastructure-except-dozen-moderates-2021-10">persists today</a>, even though most research <a href="https://www.businessinsider.com/tax-cuts-rich-trickle-down-income-inequality-study-2020-12">has shown</a> that 50 years of tax cuts benefits the wealthy and worsens inequality.<a> </a></p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img decoding="async" width="396" height="505" src="https://images.paulspoerry.com/2021/12/image.png" alt="" class="wp-image-17863" srcset="http://images.paulspoerry.com/2021/12/image.png 396w, http://images.paulspoerry.com/2021/12/image-235x300.png 235w" sizes="(max-width: 396px) 100vw, 396px" /></figure></div>



<p>The researchers are some of the leading minds on inequality in the entire field of economics. Chancel is the co-director of the World Inequality Lab, while Saez and Zucman have&nbsp;<a href="https://www.businessinsider.com/how-gabriel-zucman-made-a-wealth-tax-popular-in-america-2019-12">literally written a book</a>&nbsp;on the rich dodging taxes and helped create wealth tax proposals for senators like Elizabeth Warren and Bernie Sanders.<a href="https://www.businessinsider.com/income-inequality-us-economy-chart-thomas-piketty-2018-9"></a></p>



<p><a href="https://www.businessinsider.com/income-inequality-us-economy-chart-thomas-piketty-2018-9">Piketty</a>, who was Zucman&#8217;s doctoral adviser, wrote the tome &#8220;<a href="https://www.businessinsider.com/reviews/out?asin=0674979850&amp;platform=browser&amp;postSource=bi%7C5de91abcfd9db23d7e486a78&amp;postTag=biauto-41667-20&amp;sc=false&amp;type=AMAZON-AFFILIATE-LINK&amp;u=https%3A%2F%2Fwww.amazon.com%2Fdp%2F0674979850%3Ftag%3Dbiauto-41667-20&amp;tag=bisafetynet2-20">Capital in the 21st Century</a>&#8221; which used an unprecedented data set going back to the French Revolution to expose how centuries of growing wealth inequality was a feature of capitalism, not a bug. The World Inequality Report was his effort to do the same for recent history.</p>



<p>They argue in the new report that the last two decades of wealth data show that &#8220;inequality is a political choice, not an inevitability.&#8221;</p>



<p>For instance, when it comes to wealth, which accounts for the values of assets people hold, researchers found that the &#8220;poorest half of the global population barely owns any wealth at all.&#8221; That bottom half owns just 2% of total wealth. That means that the top half of the world holds 98% of the world&#8217;s wealth, and that gets even more concentrated the wealthier you get.</p>



<p>Indeed, the richest 10% of the world&#8217;s population hold 76%, or two-thirds of all wealth. That means the 517 million people who make up the top hold vastly more than the 2.5 billion who make up the bottom. The world&#8217;s policy choices have led to wealth trickling up rather than down.&nbsp;https://datawrapper.dwcdn.net/uIiMY/1/</p>



<p>One group in particular has seen its share of global wealth swell.</p>



<h2>Billionaires now hold a 3% share of global wealth, up from 1% in 1995</h2>



<p>The report notes that &#8220;2020 marked the steepest increase in global billionaires&#8217; share of wealth on record.&#8221; Broadly, the number of billionaires rose to a record-number in 2020, with Wealth-X&nbsp;<a href="https://www.businessinsider.com/number-of-billionaires-in-world-grew-pandemic-wealth-tax-2021-9">finding</a>&nbsp;that there are now over 3,000 members of the three-comma club.&nbsp;</p>



<p>Billionaire gains are a well-documented trend: The left-leaning Institute for Policy Studies and Americans for Tax Fairness&nbsp;<a href="https://www.businessinsider.com/american-billionaires-add-21-trillion-to-fortunes-during-pandemic-2021-10">found</a>&nbsp;that Americans added $2.1 trillion to their wealth during the pandemic, a 70% increase.&nbsp;&nbsp;</p>



<p>So what could work better than the current system? As the authors note, there&#8217;s been a renewed interest in taxing wealth during the pandemic: &#8220;It would be completely unreasonable not to ask more to top wealth-holders in the future, especially in light of the social, developmental and environmental challenges ahead.&#8221;</p>



<p>For the authors, that means expanding wealth taxes like property taxes to all different types of wealth, and to make taxes progressive — meaning they increase with net worth. The US has seen proposals from leading progressives like Sen. Elizabeth Warren and Sen. Ron Wyden that would respectively tax billionaire wealth outright, or tax the gains their assets see. But <a href="https://www.businessinsider.com/democrats-ditch-billionaire-tax-proposal-says-house-tax-writer-report-2021-10">neither is moving forward</a>. Read the original article on <a href="https://www.businessinsider.com/how-bad-is-inequality-trickle-down-economics-thomas-piketty-economists-2021-12">Business Insider</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Developers vs QA</title>
		<link>https://www.paulspoerry.com/2021/developers-vs-qa/</link>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Thu, 19 Aug 2021 02:56:00 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[That's freakin hilarious]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17854</guid>

					<description><![CDATA[The struggle is real&#8230; Also, devs would create things quicker but they would suck for the average joe without QA people.]]></description>
										<content:encoded><![CDATA[
<h2>The struggle is real&#8230;</h2>



<p>Also, devs would create things quicker but they would suck for the average joe without QA people. </p>



<figure class="wp-block-video"><video controls src="https://images.paulspoerry.com/2021/08/DevVsQA.mp4"></video></figure>
]]></content:encoded>
					
		
		<enclosure url="https://images.paulspoerry.com/2021/08/DevVsQA.mp4" length="18771847" type="video/mp4" />

			</item>
		<item>
		<title>Happy Bitcoin Bitcoin Pizza Day!</title>
		<link>https://www.paulspoerry.com/2020/happy-bitcoin-bitcoin-pizza-day/</link>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Fri, 22 May 2020 15:17:09 +0000</pubDate>
				<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17851</guid>

					<description><![CDATA[May 22, 2010 marks the 10th anniversary of the first Bitcoin transaction, in which a Florida man paid for two pizzas with the Bitcoin. The day has become part of folklore, not because of the transaction, but more the price: Laszlo Hanyecz paid 10,000 Bitcoins for two Papa John&#8217;s pizzas. In a recent interview, he [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div data-amp-lightbox="true" class="wp-block-image is-style-default"><figure class="aligncenter size-large"><img decoding="async" loading="lazy" width="500" height="334" src="https://images.paulspoerry.com/2020/05/bitcoin-pizza-day-500x334.jpg" alt="" class="wp-image-17852" srcset="http://images.paulspoerry.com/2020/05/bitcoin-pizza-day-500x334.jpg 500w, http://images.paulspoerry.com/2020/05/bitcoin-pizza-day-300x200.jpg 300w, http://images.paulspoerry.com/2020/05/bitcoin-pizza-day-768x513.jpg 768w, http://images.paulspoerry.com/2020/05/bitcoin-pizza-day.jpg 1000w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<p>May 22, 2010 marks the 10th anniversary of the first Bitcoin transaction, in which a Florida man paid for two pizzas with the Bitcoin. The day has become part of folklore, not because of the transaction, but more the price: Laszlo Hanyecz paid 10,000 Bitcoins for two Papa John&#8217;s pizzas. </p>



<p>In a recent interview, he said pizzas were delicious and that he does not regret anything. 10,000 $BTC is now worth around $92 <em>Million </em>USD.</p>



<p>Organized on bitcointalk forum, the Florida man reached out for help. &#8220;I&#8217;ll pay 10,000 bitcoins for a couple of pizzas.. like maybe 2 large ones so I have some left over for the next day,&#8221; Hanyecz wrote.</p>



<p>&#8220;I like having left over pizza to nibble on later.&nbsp;You can make the pizza yourself and bring it to my house or order it for me from a delivery place, but what I&#8217;m aiming for is getting food delivered in exchange for bitcoins where I don&#8217;t have to order or prepare it myself, kind of like ordering a &#8216;breakfast platter&#8217; at a hotel or something, they just bring you something to eat and you&#8217;re happy!&#8221;</p>



<p>A British man took up Hanyecz&#8217;s offer and bought the two pizzas for him in exchange for the 10,000 Bitcoins. Even then the recipient of the Bitcoins got himself a bargain, paying $25 for the pizzas, while 10,000 Bitcoins were worth around $41 at the time. </p>



<p>Despite the astronomical rise in the price of Bitcoin it seems Hanyecz is not phased about his deal. &#8220;It wasn’t like Bitcoins had any value back then, so the idea of trading them for a pizza was incredibly cool,&#8221; Hanyecz told the NY Times. </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Android games to keep you busy during social distancing</title>
		<link>https://www.paulspoerry.com/2020/android-games-to-keep-you-busy-during-social-distancing/</link>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Fri, 10 Apr 2020 14:21:07 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Games]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17846</guid>

					<description><![CDATA[No specific order&#8230; though these are typically pay games or ones that do NOT require In App Purchases (IAP) to play. Hades Star (my current and long running obsession) Bridge Constructor Portal Mini Metro Monument Valley 2 (1 is great too) Island Delta Agent A Human Resource Machine Counterspy The Room Three (everything in this [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter size-large"><img decoding="async" loading="lazy" width="500" height="317" src="https://images.paulspoerry.com/2020/04/Google-Play-Games-cover-1-500x317.jpg" alt="" class="wp-image-17848" srcset="http://images.paulspoerry.com/2020/04/Google-Play-Games-cover-1-500x317.jpg 500w, http://images.paulspoerry.com/2020/04/Google-Play-Games-cover-1-300x190.jpg 300w, http://images.paulspoerry.com/2020/04/Google-Play-Games-cover-1-768x487.jpg 768w, http://images.paulspoerry.com/2020/04/Google-Play-Games-cover-1.jpg 1262w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<p>No specific order&#8230; though these are typically pay games or ones that do NOT require In App Purchases (IAP) to play.</p>



<ul><li><a href="https://play.google.com/store/apps/details?id=com.ParallelSpace.Cerberus" target="_blank" rel="noreferrer noopener">Hades Star</a> (my current and long running obsession)</li><li><a href="https://play.google.com/store/apps/details?id=com.headupgames.bridgeconstructorportal" target="_blank" rel="noreferrer noopener">Bridge Constructor Portal</a></li><li><a href="https://play.google.com/store/apps/details?id=nz.co.codepoint.minimetro" target="_blank" rel="noreferrer noopener">Mini Metro</a></li><li><a href="https://play.google.com/store/apps/details?id=com.ustwo.monumentvalley2" target="_blank" rel="noreferrer noopener">Monument Valley 2</a> (1 is great too)</li><li><a href="https://play.google.com/store/apps/details?id=com.noodlecake.islanddelta" target="_blank" rel="noreferrer noopener">Island Delta</a></li><li><a href="https://play.google.com/store/apps/details?id=co.yakand.agentaapuzzleindisguise" target="_blank" rel="noreferrer noopener">Agent A</a></li><li><a href="https://play.google.com/store/apps/details?id=com.tomorrowcorporation.humanresourcemachine" target="_blank" rel="noreferrer noopener">Human Resource Machine</a></li><li><a href="https://play.google.com/store/apps/details?id=com.playstation.counterspy" target="_blank" rel="noreferrer noopener">Counterspy</a></li><li><a href="https://play.google.com/store/apps/details?id=com.FireproofStudios.TheRoom3" target="_blank" rel="noreferrer noopener">The Room Three</a> (everything in this series is great though)</li><li><a href="https://play.google.com/store/apps/details?id=fi.bugbyte.harbinger" target="_blank" rel="noreferrer noopener">Battlevoid Harbinger</a></li><li><a href="https://play.google.com/store/apps/details?id=ch.feinheit.games.firststrike" target="_blank" rel="noreferrer noopener">First Strike Final Hour</a></li><li><a href="https://play.google.com/store/apps/details?id=com.KonfaGames.Despotism3k" target="_blank" rel="noreferrer noopener">Despotism 3k</a></li><li><a href="https://play.google.com/store/apps/details?id=com.PlausibleConcept.BadNorthFull&amp;hl=en_US" target="_blank" rel="noreferrer noopener">Bad North: Jotunn Edition</a></li><li><a href="https://play.google.com/store/apps/details?id=com.squareenixmontreal.hitmansniperandroid" target="_blank" rel="noreferrer noopener">Hitman Sniper</a> (this does have some IAP but I don&#8217;t think they are required&#8230; they would just speed you up to get additional rifles. I think&#8230; it&#8217;s been ages and I still don&#8217;t uninstall it because I played the every living shit out of this game)</li></ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple&#8217;s Privacy myth needs to end</title>
		<link>https://www.paulspoerry.com/2020/apples-privacy-myth-needs-to-end/</link>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Thu, 23 Jan 2020 17:11:13 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17835</guid>

					<description><![CDATA[It’s pretty clear that most people have very little understanding of privacy, falling victim to mainstream media’s depiction of it and the world in general—the very power system(s) they&#8217;re trying to combat. The belief in Apple as privacy-oriented is one such illusion. So before starting I highly suggest people educate themselves on media and propaganda [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter size-large"><img decoding="async" src="https://images.paulspoerry.com/2020/01/applePrivacyMyth-500x298.png" alt="" class="wp-image-17840"/></figure></div>



<p>It’s pretty clear that most people have very little understanding of privacy, falling victim to mainstream media’s depiction of it and the world in general—the very power system(s) they&#8217;re trying to combat. The belief in Apple as privacy-oriented is one such illusion. So before starting I highly suggest people educate themselves on media and propaganda (I’ll happily provide book recommendations) to develop a more critical framework. A good introduction is <a rel="noreferrer noopener" href="https://www.youtube.com/watch?v=EuwmWnphqII" target="_blank">this documentary</a>.</p>



<p>A rough summary is that mainstream media are huge corporations whose profit-making comes not from readers/viewers or paid subscribers, but advertisers. This means there’s two important institutional constraints on media ideology: that of their owners and of their buyers. Both inherently determine their values and the kind of content they make. Corporate media are businesses selling products (us, consumers) to other businesses. What kind of ideology and picture of the world do you think you’re getting from that?.</p>



<p>The rest of this post is written under the assumption that this sub is informed enough to view Apple as nothing more than “the lesser of evils”. A perspective I will argue is still misguided.</p>



<p><strong>1.</strong>&nbsp;<strong>USER IDENTIFICATION:</strong></p>



<p>Outside the ones shared by all competing products in the industry, there are additional ways to identify you in specifically Apple products.</p>



<ol><li>iOS subliminally and constantly collects sensitive data and links it to hardware identifiers almost guaranteed to link to a real identity.</li><li>iOS forces users to activate devices which sets up a remote UUID-linked (also collecting registration IP) database for a given device with Apple’s services.</li><li>iOS and iOS-based coprocessors force the regular sending of incredibly sensitive metadata to Apple for the mere ability to use the device for questionable and unknown reasons.</li></ol>



<p><strong>2.1. PRIVACY POLICY IN PRACTICE IN REGARDS TO THE AUTHORITIES:</strong></p>



<p>Apple is subject to the&nbsp;<a href="https://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008" rel="noreferrer noopener" target="_blank">FISA Amendments Act of 2009</a>, and PRISM is an example of that law in practice, which Apple is part of (amongst others).</p>



<p>As public disclosure of cooperation with authorities have been allowed in in limited degrees in recent years, we’ve seen examples like Apple admitting to&nbsp;<a href="https://www.businessinsider.com/apple-complies-percent-us-government-requests-customer-data-2020-1?r=US&amp;IR=T" rel="noreferrer noopener" target="_blank">complying with 90% of government requests of accessing thousands of user file</a><a href="https://www.businessinsider.com/apple-complies-percent-us-government-requests-customer-data-2020-1?r=US&amp;IR=T" rel="noreferrer noopener" target="_blank">s every year</a>.&nbsp;<strong>FBI openly praised them for providing &#8220;ample assistance&#8221;</strong>. It therefore came as no surprise when a recent leak revealed that&nbsp;<a href="https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT?utm_source=reddit.com" rel="noreferrer noopener" target="_blank">the company purposefully kept their phones less secure to make&nbsp;</a><a href="https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT" rel="noreferrer noopener" target="_blank">access easier for the authorities</a>. Despite all this, Apple is still most associated with the FBI encryption dispute in 2015, which has been a huge PR success for them.</p>



<p>The latter case,&nbsp;<a href="https://www.aclu.org/blog/privacy-technology/internet-privacy/one-fbis-major-claims-iphone-case-fraudulent?redirect=blog/free-future/one-fbis-major-claims-iphone-case-fraudulent" rel="noreferrer noopener" target="_blank">which w</a><a href="https://www.aclu.org/blog/privacy-technology/internet-privacy/one-fbis-major-claims-iphone-case-fraudulent?redirect=blog/free-future/one-fbis-major-claims-iphone-case-fraudulent" rel="noreferrer noopener" target="_blank">as completely fraudulent</a>, is still widely circulated and frequently brought up as demonstration of Apple&#8217;s integrity. In reality it was a demonstration, like the general theme of much else in this post, of successful media propaganda. Apple (or even FBI) aren’t able to fool professional and well-educated journalists of NYT, WP, etc. They also rely on the media&#8217;s conformity through misrepresentation of the available facts, as well as accessible and well-known critique.</p>



<p>Apple have outlined how&nbsp;<a href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/" rel="noreferrer noopener" target="_blank">they give virtually everything relevant&nbsp;</a><a href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/" rel="noreferrer noopener" target="_blank">on iCloud to the authorities</a>. As the CEO of ElcomSot, a security company that revealed iCloud was uploading data to Apple servers without users knowing, said:&nbsp;<a href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/" rel="noreferrer noopener" target="_blank">&#8220;The takeaway really is don&#8217;t ever used iCloud&#8221;.</a>&nbsp;Apple having the encryption keys to iCloud as well as other parts of your iPhone completely invalidates the point of E2EE, and might explain why/how&nbsp;<a href="https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html" rel="noreferrer noopener" target="_blank"><strong>NSA mines</strong></a><a href="https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html" rel="noreferrer noopener" target="_blank"><strong>data directly from their servers</strong></a><strong>.</strong></p>



<p>The company&#8217;s respect for privacy is no better outside the US. We know that they&nbsp;<a href="https://www.thestar.com.my/tech/tech-news/2017/11/24/apple-we-can-promote-freedom-of-expression-in-china-as-we-block-vpn-apps" rel="noreferrer noopener" target="_blank">oblige and assist authoritarian governments</a>&nbsp;like China in installing firewalls to block citizens&#8217; access to encrypted tools, like social media apps. They’re actively undermining people’s security and privacy from violent regimes for the sake of profit.</p>



<p><strong>2.2. PRIVACY POLICY IN PRACTICE IN REGARDS TO THE PRIVATE INDUSTRY.</strong></p>



<p><a href="https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/" rel="noreferrer noopener" target="_blank">Apple sell</a><a href="https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/" rel="noreferrer noopener" target="_blank">certificates to third-party developers that allow the</a><a href="https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/" rel="noreferrer noopener" target="_blank">m&nbsp;</a><a href="https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/" rel="noreferrer noopener" target="_blank">to track users within&nbsp;</a><a href="https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/" rel="noreferrer noopener" target="_blank">their&nbsp;</a><a href="https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/" rel="noreferrer noopener" target="_blank">own app</a><a href="https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/" rel="noreferrer noopener" target="_blank">s</a>—<strong>third-party developers are allowed to collect data on iOS.</strong>&nbsp;Facebook&#8217;s privacy scandal (interestingly,&nbsp;<a href="https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html" rel="noreferrer noopener" target="_blank">Apple themselves were one of the main partners buying data from Facebook</a>) involved iOS users as well due to the mentioned tracking. Apple reacted to the scandal with another publicity stunt by superficially punishing Facebook. A real response, like removing Facebook from the App Store or removing their ability to track you, did not happen.</p>



<p>The company attacks Google and Facebook&#8217;s intrusion on users&#8217; privacy, yet are enabling them and other businesses in doing so on their products. They even use Google as Safari&#8217;s default search provider—<a href="https://fortune.com/2018/09/29/google-apple-safari-search-engine/" rel="noreferrer noopener" target="_blank">making&nbsp;</a><a href="https://fortune.com/2018/09/29/google-apple-safari-search-engine/" rel="noreferrer noopener" target="_blank">12 billion USD in 2019 alone from this deal.</a></p>



<p>If they really cared about privacy they would deny the ability of privacy-invasive apps to collect any user date. They don&#8217;t because these apps&#8217; importance in keeping their products&#8217; platform popular and therefore profitable.</p>



<p><strong>3. THE LACK OF OPEN SOURCE CODE.</strong></p>



<p>Open source code, specifically those that have been audited, is for obvious reasons much safer than closed source ones.&nbsp;<a href="https://keepass.info/ratings.html" rel="noreferrer noopener" target="_blank">Even government&nbsp;</a><a href="https://keepass.info/ratings.html" rel="noreferrer noopener" target="_blank">agencies take it into account in choosing secure software for their members.</a></p>



<p>It is all the more important when the company in question surrenders data to state authorities, allows third-party developers to collect data,&nbsp;<a href="https://www.wired.com/story/apple-differential-privacy-shortcomings/" rel="noreferrer noopener" target="_blank">have weak security measures&nbsp;</a>(sometimes on purpose) and have been discovered of numerous suspicious activities. No to mention the fact that Apple&#8217;s verification mechanism in designed in such a way that they have the ability to&nbsp;<a href="https://gist.github.com/iosecure/357e724811fe04167332ef54e736670d" rel="noreferrer noopener" target="_blank">“silently send targeted malicious updates to devices matching specific unique ID criteria”</a>.&nbsp;<strong>iOS is a textbook example of why closed source is bad.</strong></p>



<p>Imagine if Huawei, on top of providing third-party developers the ability to track its users, admitted to giving the Chinese government access to user data (but only after it was caught doing so) and were continuously caught in suspicious activities (many involving Chinese authorities)—all on a completely closed source software platform. Would you take their claims of &#8220;security&#8221; and &#8220;privacy&#8221; seriously?</p>



<p>Many users (predominately Americans) already have a hard time trusting Huawei,&nbsp;<a href="https://www.reddit.com/r/hardware/comments/e5znge/huawei_aims_for_desktop_pc_market_with/f9om1yd?utm_source=share&amp;utm_medium=web2x" rel="noreferrer noopener" target="_blank">despite 0 evidence of illegal data collection&nbsp;</a><a href="https://www.reddit.com/r/hardware/comments/e5znge/huawei_aims_for_desktop_pc_market_with/f9om1yd?utm_source=share&amp;utm_medium=web2x" rel="noreferrer noopener" target="_blank">of users</a><a href="https://www.reddit.com/r/hardware/comments/e5znge/huawei_aims_for_desktop_pc_market_with/f9om1yd?utm_source=share&amp;utm_medium=web2x" rel="noreferrer noopener" target="_blank">&nbsp;or&nbsp;</a><a href="https://www.reddit.com/r/hardware/comments/e5znge/huawei_aims_for_desktop_pc_market_with/f9om1yd?utm_source=share&amp;utm_medium=web2x" rel="noreferrer noopener" target="_blank">claimed connections with the CCP.</a>&nbsp;Users have bought into US government claims and mainstream media propaganda. At the same time they buy and congratulate Apple for their privacy-oriented approach.&nbsp;<strong>A perfect example of a system of indoctrination.</strong></p>



<p><strong>4. ALTERNATIVES.</strong></p>



<p>Here are some&nbsp;<em>reasonable</em>&nbsp;steps with descending order in how effective they are, that provide you with Android-based alternatives superior to iOS in privacy and security:</p>



<p><strong>1:</strong>&nbsp;Disable Google tracking and services in settings (the little that they make available to you) and use F-Droid instead of Play Store. Notwithstanding the lack of privacy in many ways, it&#8217;s a good starting point.</p>



<p>-At this point your privacy from private companies is a bit better than on iOS.</p>



<p><strong>1.5:</strong>&nbsp;Some OEMs, like Huawei, simplify and help users uninstall Google apps and services. Huawei’s current products (like Mate Pro 30) also come without all that, due to the current trade war. The phones still come with Huawei bloat and their ad-based data mining, but it’s nowhere as bad as Google and easier to evade.</p>



<p>-At this point your privacy from private companies is better than on iOS.</p>



<p><strong>2:</strong>&nbsp;Root your device (an easy task) and uninstall all Google apps and services, as well as anything else, completely.</p>



<p>-At this point your privacy from both government and private companies is better than on iOS.</p>



<p><strong>3:</strong>&nbsp;Install Custom ROMs that allow the same as&nbsp;<strong>2</strong>, have even more open software for examination and also include enhanced privacy features in the system (or you can get these as third-party apps). Some, like LineageOS, also provide UI, performance and update cycles superior to almost all the main Android OSes (One UI, MIUI, EMUI, LG UI, etc.)</p>



<p>-At this point your privacy from both government and private companies is significantly better than on iOS.</p>



<p><strong>4:</strong>&nbsp;GrapheneOS. It provides an exceptional level of privacy and security that has been&nbsp;<a href="https://twitter.com/Snowden/status/1175430722733129729?s=09" rel="noreferrer noopener" target="_blank">praised by&nbsp;</a><a href="https://twitter.com/Snowden/status/1175430722733129729?s=09" rel="noreferrer noopener" target="_blank">Snowden</a>&nbsp;himself. It runs a stock Android setup with the same pros as LOS above, making it very well from a non-privacy perspective as well. If you want a user-friendly and highly privacy-related platform without having to do a lot of tinkering and manual management, this is the ROM for you.</p>



<p>-At this point your privacy from both government and private companies is tremendously better than on iOS.</p>



<p><strong>5. SUMMARY: IPHONES ARE NOT THE BEST ALTERNATIVE FOR DATA PRIVACY.</strong></p>



<p>iPhones give no additional security and privacy from the government over Android phones. They only do in limited conditions that are inconsequential to this sub. The minute you want to improve your privacy and security beyond what you get out of the box, iOS is terrible.&nbsp;<strong>It is not the &#8220;lesser of evils&#8221;— a myth that needs to die.</strong></p>



<p>Additionally, positioning themselves as a beacon of privacy make them even more dangerous, as they become a honeypot for people in severe need of privacy. This has profound consequences in authoritarian societies for journalists, demonstrators and other dissidents.&nbsp;<a href="https://en.wikipedia.org/wiki/COINTELPRO" rel="noreferrer noopener" target="_blank">COINTELPRO</a>&nbsp;has shown how ugly it can get in free societies as well.</p>



<p>If Apple&#8217;s software and ecosystem is more important to you than increased security on even some of the best UX alternatives on Android (LOS, GrapheneOS, etc), then at least admit to this hard truth and move on. Spreading misinformation undermines the privacy of others, and doing that to serve your confirmation bias is disingenuous and honestly deplorable.<br><br>Note: None of this is to say that Google Android is necessarily a secure alternatives in general, only in&nbsp; <strong>relative terms</strong> &#8211; but at least it&#8217;s Open Source. Having said that, the hardware it runs on is not and some features they are building in only work on their devices. So if you have a Pixel and want all the features you are locked, essentially, into Close Source hardware due to chips like PVC,Titan, Soli, etc. Pixels with GOS make very little sense due to them being overpriced and having fairly mediocre flagship hardware. Their most fundamental strengths lie in software smoothness and image processing. Both of which are are lost when installing GOS.</p>



<p>It&#8217;s important to understand that while not ending government intrusion (though severely limiting it and its data mining), the available methods on Android, which include continuous development of new and better measures, tremendously improve on privacy from the private industry. All that is is simply impossible on iOS as a system; its security and privacy out of the box is also all you get. You have zero flexibility on the system and are completely locked in. This is really bad with their track record (covered in OP). All its important hardware being in-house and exclusive to them is even more troubling.</p>



<p>A good way to approach hardware security is to see what members of non-allied countries use. To give an example,&nbsp;<a href="https://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html" rel="noreferrer noopener" target="_blank">Germany&#8217; aerospace industry got rid of Cisco routers after discovering backdoors installed in their hardware.</a>&nbsp;The issue in that case was industrial espionage, which The Five Eyes&#8217; Project ECHELON, as a&nbsp;<a href="http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+REPORT+A5-2001-0264+0+DOC+PDF+V0//EN&amp;language=EN" rel="noreferrer noopener" target="_blank">European Union report</a>&nbsp;on the matter states, is&nbsp;<strong>&#8220;a global system for the interception of private and commercial communications&#8221;</strong>.</p>



<p>As for general surveillance,&nbsp;<a href="https://www.theguardian.com/books/2014/may/12/glenn-greenwald-nsa-tampers-us-internet-routers-snowden" rel="noreferrer noopener" target="_blank">when Angela Merkel found out that her and other politicians&#8217; Nokia 6260 Slides were tapped by US intelligence</a>, she switched to a Blackberry fitted with an encryption chip by Secusmart. The latter company is a popular option for many government agencies.</p>



<p>Another thing to consider in a scenario where you need to choose between hardware backdoors of two rivalling countries, is to always go for the rival/enemy. It&#8217;s safer for a Chinese citizen to use phones with US-based hardware backdoors, and equally so for a US citizen to use phones with Chinese hardware backdoors. The reason being that the most immediate and relevant threats to you is your own government. They are the ones with sovereignty and monopoly of power over you and they are the ones who care.&nbsp;<strong>If surveillance is the only choice, it&#8217;s always better to choose a non-allied country.</strong></p>



<p>Of course, the above hardware backdoor example is theoretical. In reality, governments often use dedicated security chips in phones unavailable to regular consumers. Furthermore, companies from non-allied countries cooperate with surveillance laws of local governments. Those relate to software and not hardware though (and this is why Android&#8217;s open source nature is extremely important).</p>



<p>Much of this is a repost from /r/Privacy.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Study Confirms Climate Models are Getting Future Warming Projections Right</title>
		<link>https://www.paulspoerry.com/2020/study-confirms-climate-models-are-getting-future-warming-projections-right/</link>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Sat, 11 Jan 2020 17:33:18 +0000</pubDate>
				<category><![CDATA[Science]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17833</guid>

					<description><![CDATA[For decades, people have legitimately wondered how well climate models perform in predicting future climate conditions. Based on solid physics and the best understanding of the Earth system available, they skillfully reproduce observed data. Nevertheless, they have a wide response to increasing carbon dioxide levels, and many uncertainties remain in the details. The hallmark of [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>For decades, people have legitimately wondered how well climate models perform in predicting future climate conditions. Based on solid physics and the best understanding of the Earth system available, they skillfully reproduce observed data. Nevertheless, they have a wide response to increasing carbon dioxide levels, and many uncertainties remain in the details. The hallmark of good science, however, is the ability to make testable predictions, and climate models have been making predictions since the 1970s. How reliable have they been?</p>



<p>Now a new evaluation of global climate models used to project Earth’s future global average surface temperatures over the past half-century answers that question:&nbsp;<strong>most of the models have been quite accurate.</strong></p>



<figure class="wp-block-image"><a href="https://climate.nasa.gov/system/internal_resources/details/original/1984_for_alan.jpg" target="_blank" rel="noreferrer noopener"><img decoding="async" src="https://climate.nasa.gov/internal_resources/1983" alt="forecast evaluation for models run in 2004"/></a><figcaption>Models that were used in the IPCC 4<sup>th</sup> Assessment Report can be evaluated by comparing their approximately 20-year predictions with what actually happened. In this figure, the multi-model ensemble and the average of all the models are plotted alongside the NASA Goddard Institute for Space Studies (GISS) <a rel="noreferrer noopener" href="https://data.giss.nasa.gov/gistemp" target="_blank">Surface Temperature Index (GISTEMP)</a>. Climate drivers were known for the ‘hindcast’ period (before 2000) and fore</figcaption></figure>



<p>We hit 2012 and everything goes bananas. The coming decades might be pretty rough. </p>



<figure class="wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Climate Simulation of Surface Air Temperature" width="500" height="281" src="https://www.youtube.com/embed/l8M901ft20c?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
</div></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google Exposes 14 Long-Hidden Exploits in iOS</title>
		<link>https://www.paulspoerry.com/2019/google-exposes-14-long-hidden-exploits-in-ios/</link>
					<comments>https://www.paulspoerry.com/2019/google-exposes-14-long-hidden-exploits-in-ios/#respond</comments>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Fri, 30 Aug 2019 18:00:54 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17826</guid>

					<description><![CDATA[According to one blog post, the 14 vulnerabilities were a part of five unique iPhone exploit chains that covered almost every version of Apple’s mobile operating system from iOS 10 to the latest version of iOS 12, indicating that the hackers were working hard to exploit the security flaws. Half of the iPhone vulnerabilities were [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>According to one blog post, the 14 vulnerabilities were a part of five unique iPhone exploit chains that covered almost every version of Apple’s mobile operating system from iOS 10 to the latest version of iOS 12, indicating that the hackers were working hard to exploit the security flaws.</p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" loading="lazy" width="500" height="281" src="https://images.paulspoerry.com/2019/08/iOS_security-500x281.jpg" alt="" class="wp-image-17827" srcset="http://images.paulspoerry.com/2019/08/iOS_security-500x281.jpg 500w, http://images.paulspoerry.com/2019/08/iOS_security-300x169.jpg 300w, http://images.paulspoerry.com/2019/08/iOS_security-768x432.jpg 768w, http://images.paulspoerry.com/2019/08/iOS_security.jpg 1280w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<p>Half of the iPhone vulnerabilities were discovered in Apple’s Safari browser, five in the kernel, and hackers also used two separate sandbox escapes to access data outside the permissions of an app or a process.</p>



<p>The attack had such deep access to iPhone systems that hackers could even read or eavesdrop the messages of victims on encrypted communications services like WhatsApp, iMessage, and ProtonMail.</p>



<p>

“There was no target discrimination,” Ian Beer, a Google hacker and member of the company’s Project Zero team, wrote in a blog. “Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant.”

</p>



<p>There’s also a chance that the attackers have acquired access tokens from the Apple victims, which they could use to log into social media and communications accounts.</p>



<p>You can read the in-depth posts on Google&#8217;s Project Zero blog.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.paulspoerry.com/2019/google-exposes-14-long-hidden-exploits-in-ios/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Debunking the far-right great replacement conspiracy theory</title>
		<link>https://www.paulspoerry.com/2019/debunking-the-far-right-great-replacement-conspiracy-theory/</link>
					<comments>https://www.paulspoerry.com/2019/debunking-the-far-right-great-replacement-conspiracy-theory/#respond</comments>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Wed, 17 Jul 2019 16:14:50 +0000</pubDate>
				<category><![CDATA[Politics]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17821</guid>

					<description><![CDATA[Citing the United Nations migration replacement report as evidence of the far-right great replacement theory is a disingenuous tactic that I&#8217;ve seen used quite often. The intent is to purposely misinterpret the preamble of the document in an attempt to &#8220;prove&#8221; the great replacement conspiracy theory, however, the United Nations report does little to support [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" loading="lazy" width="500" height="282" src="http://images.paulspoerry.com/2019/07/FarRight-500x282.jpg" alt="The Far Right" class="wp-image-17822" srcset="http://images.paulspoerry.com/2019/07/FarRight-500x282.jpg 500w, http://images.paulspoerry.com/2019/07/FarRight-300x169.jpg 300w, http://images.paulspoerry.com/2019/07/FarRight.jpg 700w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<p>Citing the United Nations migration replacement report as evidence of the far-right great replacement theory is a disingenuous tactic that I&#8217;ve seen used quite often. The intent is to purposely misinterpret the preamble of the document in an attempt to &#8220;prove&#8221; the great replacement conspiracy theory, however, the United Nations report does little to support the far-right conspiracy. The report indicates that western nations require immigration due to economic necessity as our projected population will significantly drop off later in the century, but the report also touches upon issues including the rise of social tensions due to cultural differences and goes into detail about the importance of integrating immigrant communities so they understand cultural norms and practices. The report concludes that future policy decisions must take into account the impact on both the host society and countries of origin.[1]</p>



<p>All too often we see those on the far-right conflate the economic necessity of immigration with a racist conspiracy theory that Muslims are going to outbreed native populations and replace them, which is currently statistically improbable even with an increase of immigration from Muslim majority countries. Moreover, the report does not claim Muslim immigrants are required therefore the referral to the migration replacement theory as proof of white genocide is not only disingenuous but nefarious in intention. The conspiracy theory is steeped in misogynistic beliefs including controlling and forcing white women to have more children as they believe feminism is the root cause of declining birth rates.[2] White nationalists believe in the concept of “race realism,” an idea that race is not a construct but a biological category that determines a person’s character.[3] As a student of anthropology, I know that it&#8217;s complete and utter racist bullshit.<br>Race is a social construct as is explicitly outlined by the leading anthropological opinion on the matter according to the American Anthropological Association.[4] Race exists as a social construct as it defines specific groups within a population that often do not share biological similarities. For example, in North America, we often categorize people into &#8220;Black,&#8221; &#8220;White,&#8221; Asian,&#8221; &#8220;Hispanic,&#8221; and Native American.&#8221; These classifications are deceptive as they attempt to define populations that are not genetically distinct, easily recognizable, or confined to one region. This limited classification does not address racial admixture, ethnicity, or nationality. In a biological context, the traditional social construct of race has very little meaning or use. When we consider these factors ancestry is the more appropriate term when we refer to a specific group of people. Differences between the &#8220;races&#8221; are manifested through a variety of morphological traits selected by ecological factors. Certain characteristics may reflect geography while some may not. Traits that seemingly distinguish individuals from others are not unique to particular racial groups but occur in every racial group in a wide range of variation. When distinguishing between individuals we refer to their ancestral traits, however due to government agencies devising standards the public is more familiar with the traditional construct of racial categories hence its common usage.</p>



<p>&#8220;Race&#8221; thus evolved as a worldview, a body of prejudgments that distorts our ideas about human differences and group behavior. Racial beliefs constitute myths about the diversity in the human species and about the abilities and behavior of people homogenized into &#8220;racial&#8221; categories. The myths fused behavior and physical features together in the public mind, impeding our comprehension of both biological variations and cultural behavior, implying that both are genetically determined. Racial myths bear no relationship to the reality of human capabilities or behavior. Scientists today find that reliance on such folk beliefs about human differences in research has led to countless errors.</p>



<p>At the end of the 20th century, we now understand that human cultural behavior is learned, conditioned into infants beginning at birth, and always subject to modification. No human is born with a built-in culture or language. Our temperaments, dispositions, and personalities, regardless of genetic propensities, are developed within sets of meanings and values that we call &#8220;culture.&#8221; Studies of infant and early childhood learning and behavior attest to the reality of our cultures in forming who we are.<br>It is a basic tenet of anthropological knowledge that all normal human beings have the capacity to learn any cultural behavior. The American experience with immigrants from hundreds of different language and cultural backgrounds who have acquired some version of American culture traits and behavior is the clearest evidence of this fact. Moreover, people of all physical variations have learned different cultural behaviors and continue to do so as modern transportation moves millions of immigrants around the world.</p>



<p>How people have been accepted and treated within the context of a given society or culture has a direct impact on how they perform in that society. The &#8220;racial&#8221; worldview was invented to assign some groups to perpetual low status, while others were permitted access to privilege, power, and wealth. The tragedy in the United States has been that the policies and practices stemming from this worldview succeeded all too well in constructing unequal populations among Europeans, Native Americans, and peoples of African descent. Given what we know about the capacity of normal humans to achieve and function within any culture, we conclude that present-day inequalities between so-called &#8220;racial&#8221; groups are not consequences of their biological inheritance but products of historical and contemporary social, economic, educational, and political circumstances.<br>White nationalists believe they are going to be replaced by what they perceive as an &#8220;inferior population&#8221; and therefore society will regress due to the supposed inferiority of immigrants when there is no scientific evidence that backs such an absurd conspiracy theory.</p>



<p>1) <a rel="noreferrer noopener" aria-label="United Nations Development of Economic and Social Affairs - Replacement Migration: Is It a Solution to Declining and Ageing Populations? (opens in a new tab)" href="https://www.un.org/en/development/desa/population/publications/ageing/replacement-migration.asp" target="_blank">United Nations Development of Economic and Social Affairs &#8211; Replacement Migration: Is It a Solution to Declining and Ageing Populations?</a><br>2) <a rel="noreferrer noopener" aria-label="New York Times - ‘Replacement Theory,’ a Racist, Sexist Doctrine, Spreads in Far-Right Circles (opens in a new tab)" href="https://www.nytimes.com/2019/03/18/technology/replacement-theory.html" target="_blank">New York Times &#8211; ‘Replacement Theory,’ a Racist, Sexist Doctrine, Spreads in Far-Right Circles</a><br>3) <a rel="noreferrer noopener" aria-label="South China Morning Post - ‘White genocide’ and ‘the great replacement’: a primer on the US alt-right movement (opens in a new tab)" href="https://www.scmp.com/lifestyle/arts-culture/article/3003143/racism-fascism-and-white-supremacy-us-explained-alt-right" target="_blank">South China Morning Post &#8211; ‘White genocide’ and ‘the great replacement’: a primer on the US alt-right movement</a><br>4) <a rel="noreferrer noopener" aria-label="American Anthropological Association - AAA Statement on Race (opens in a new tab)" href="https://www.americananthro.org/ConnectWithAAA/Content.aspx?ItemNumber=2583" target="_blank">American Anthropological Association &#8211; AAA Statement on Race</a></p>



<p>Source: <a href="https://np.reddit.com/r/politics/comments/cd4qn2/megathread_trump_tells_freshman_congresswomen_to/etrmnn4/" target="_blank" rel="noreferrer noopener" aria-label="PoppinKREAM on Reddit (opens in a new tab)">PoppinKREAM on Reddit</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.paulspoerry.com/2019/debunking-the-far-right-great-replacement-conspiracy-theory/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Studies Old Scientific Papers, Makes New Discoveries Overlooked by Humans</title>
		<link>https://www.paulspoerry.com/2019/ai-studies-old-scientific-papers-makes-new-discoveries-overlooked-by-humans/</link>
					<comments>https://www.paulspoerry.com/2019/ai-studies-old-scientific-papers-makes-new-discoveries-overlooked-by-humans/#respond</comments>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Wed, 17 Jul 2019 15:54:13 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17816</guid>

					<description><![CDATA[Researchers from Lawrence Berkeley National Laboratory trained an AI called Word2Vec on scientific papers to see if there was any “latent knowledge” that humans weren’t able to grock on first pass. The study, published in Nature on July 3, reveals that the algorithm found predictions for potential thermoelectric materials which can convert heat into energy for various [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" loading="lazy" width="500" height="277" src="https://images.paulspoerry.com/2019/07/ai-scientific-papers-500x277.jpg" alt="" class="wp-image-17817" srcset="http://images.paulspoerry.com/2019/07/ai-scientific-papers-500x277.jpg 500w, http://images.paulspoerry.com/2019/07/ai-scientific-papers-300x166.jpg 300w, http://images.paulspoerry.com/2019/07/ai-scientific-papers.jpg 740w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<p>Researchers from Lawrence Berkeley National Laboratory trained an AI called Word2Vec on scientific papers to see if there was any “latent knowledge” that humans weren’t able to grock on first pass.</p>



<p>The study, published in <em><a href="https://www.nature.com/articles/s41586-019-1335-8.epdf?referrer_access_token=eK746yKIMbzut7IZ-jSSANRgN0jAjWel9jnR3ZoTv0P9QxlcO86f_GXZRxwYijrqa11Mx55SgniZXv55YKOR_sn816NK2x0O46Vim16XrS-SjyP9GMXeDQinUN75ES6enlxK__J5UabR6JdgR19bZSVLL5ZsK8146qMcipEbItW65C8aSk29Q_BfrKz4Gb5-kjz3m7dIaoRxs3e1I6qW4022QZ6aZMaOPxlATK7OOqj8lrhj-yufvROMPdStMZjAEK-efja6SfW5n-6xhZuV37VdZHZcTAICYv8o9PVORZ7QrORsSTSqi8ssUq2Jnqob" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">Nature</a></em> on July 3, reveals that the algorithm found predictions for potential thermoelectric materials which can convert heat into energy for various heating and cooling applications.</p>



<blockquote class="wp-block-quote"><p> <em>The algorithm didn’t know the definition of thermoelectric, though. It received no training in materials science. Using only word associations, the algorithm was able to provide candidates for future thermoelectric materials, some of which may be better than those we currently use. –</em><a href="https://www.vice.com/en_us/article/neagpb/ai-trained-on-old-scientific-papers-makes-discoveries-humans-missed">Motherboard</a> </p></blockquote>



<p>“It can read any paper on material science, so can make connections that no scientists could,” said researcher Anubhav Jain. “Sometimes it does what a researcher would do;&nbsp;<strong>other times it makes these cross-discipline associations.</strong>”</p>



<p>The algorithm was designed to assess the language in&nbsp;<strong>3.3 million abstracts&nbsp;</strong>from material sciences, and was able to build a vocabulary of around half-a-million words. Word2Vec used machine learning to analyze relationships between words.</p>



<p>“The way that this Word2vec algorithm works is that you train a neural network model to remove each word and predict what the words next to it will be,” said Jain, adding that “by training a neural network on a word,&nbsp;<strong>you get representations of words that can actually confer knowledge.</strong>”</p>



<blockquote class="wp-block-quote"><p>Using just the words found in scientific abstracts, the algorithm was able to understand concepts such as the periodic table and the chemical structure of molecules. The algorithm linked words that were found close together, creating vectors of related words that helped define concepts. In some cases, words were linked to thermoelectric concepts but had never been written about as thermoelectric in any abstract they surveyed. This gap in knowledge is hard to catch with a human eye, but easy for an algorithm to spot.</p><p>After showing its capacity to predict future materials, researchers took their work back in time, virtually. They scrapped recent data and tested the algorithm on old papers, seeing if it could predict scientific discoveries before they happened. Once again, the algorithm worked.&nbsp;–<a href="https://www.vice.com/en_us/article/neagpb/ai-trained-on-old-scientific-papers-makes-discoveries-humans-missed">Motherboard</a></p></blockquote>



<p>The technology isn’t restricted to materials science either – as it can be trained on a wide variety of disciplines by retraining it on literature from whichever subject for which one wants to provide a deeper analysis.</p>



<p>“This algorithm is unsupervised and it builds its own connections,” said the study’s lead author, Vahe Tshitoyan, adding “You could use this for things like medical research or drug discovery. The information is out there. We just haven’t made these connections yet because you can’t read every article.”</p>



<p>Check out the <a href="https://www.nature.com/articles/s41586-019-1335-8.epdf?referrer_access_token=eK746yKIMbzut7IZ-jSSANRgN0jAjWel9jnR3ZoTv0P9QxlcO86f_GXZRxwYijrqa11Mx55SgniZXv55YKOR_sn816NK2x0O46Vim16XrS-SjyP9GMXeDQinUN75ES6enlxK__J5UabR6JdgR19bZSVLL5ZsK8146qMcipEbItW65C8aSk29Q_BfrKz4Gb5-kjz3m7dIaoRxs3e1I6qW4022QZ6aZMaOPxlATK7OOqj8lrhj-yufvROMPdStMZjAEK-efja6SfW5n-6xhZuV37VdZHZcTAICYv8o9PVORZ7QrORsSTSqi8ssUq2Jnqob" target="_blank" rel="noreferrer noopener" aria-label="full thing right over here (opens in a new tab)">full thing right over here</a>. </p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.paulspoerry.com/2019/ai-studies-old-scientific-papers-makes-new-discoveries-overlooked-by-humans/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Facebook announces Libra cryptocurrency: It&#8217;s not a cryptocurrency</title>
		<link>https://www.paulspoerry.com/2019/facebook-announces-libra-cryptocurrency-its-not-a-cryptocurrency/</link>
					<comments>https://www.paulspoerry.com/2019/facebook-announces-libra-cryptocurrency-its-not-a-cryptocurrency/#respond</comments>
		
		<dc:creator><![CDATA[Paul Spoerry]]></dc:creator>
		<pubDate>Tue, 18 Jun 2019 18:01:02 +0000</pubDate>
				<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.paulspoerry.com/?p=17801</guid>

					<description><![CDATA[Facebook has revealed&#160;the details&#160;of its cryptocurrency, Libra, which will let you buy things or send money to people with nearly zero fees. You’ll pseudonymously buy or cash out your Libra online or at local exchange points like grocery stores, and spend it using interoperable third-party wallet apps or Facebook’s own&#160;Calibra wallet&#160;that will be built into [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" loading="lazy" width="500" height="281" src="http://images.paulspoerry.com/2019/06/Facebook-Libra1-500x281.png" alt="Facebook Libra" class="wp-image-17802" srcset="http://images.paulspoerry.com/2019/06/Facebook-Libra1-500x281.png 500w, http://images.paulspoerry.com/2019/06/Facebook-Libra1-300x168.png 300w, http://images.paulspoerry.com/2019/06/Facebook-Libra1-768x431.png 768w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<amp-fit-text layout="fixed-height" min-font-size="14" max-font-size="48" height="50"><p><strong>Facebook </strong>has revealed&nbsp;<a href="https://libra.org/en-US/">the details</a>&nbsp;of its cryptocurrency, Libra, which will let you buy things or send money to people with nearly zero fees. You’ll pseudonymously buy or cash out your Libra online or at local exchange points like grocery stores, and spend it using interoperable third-party wallet apps or Facebook’s own&nbsp;<a href="https://newsroom.fb.com/news/2019/06/coming-in-2020-calibra/">Calibra wallet</a>&nbsp;that will be built into WhatsApp, Messenger and its own app. Today Facebook&nbsp;<a href="https://libra.org/en-US/wp-content/uploads/sites/23/2019/06/IntroducingLibra_en_US.pdf">released</a>&nbsp;its&nbsp;<a href="https://libra.org/en-US/white-paper/">white paper</a>&nbsp;explaining Libra and its&nbsp;<a href="https://developers.libra.org/">testnet</a>&nbsp;for working out the kinks of its blockchain system before a public launch in the first half of 2020. If the idea of Facebook and it&#8217;s partner companies having even more information on you&#8230; you should be. </p></amp-fit-text>



<p>Libra, will run on a blockchain network secured at launch by 100 distributed computer servers, or nodes. Twenty-eight node-running members are currently on board.</p>



<p>The Libra blockchain will go live in 2020, with the Libra Association – a Switzerland-based non-profit – tasked with leading the cryptocurrency’s ongoing development. In a white paper released Tuesday, the organization detailed how the&nbsp;Libra blockchain will be Byzantine fault-tolerant, meaning faulty behavior by some of the actors in the network will not compromise the security of the broader network.</p>



<p>It states:</p>



<blockquote class="wp-block-quote"><p>“[The Libra blockchain makes] it extraordinarily difficult for an attacker to compromise 33 separately run nodes that would be required to launch an attack against the system.”</p></blockquote>



<p>Facebook is launching a subsidiary company also called Calibra that handles its crypto dealings and protects users’ privacy by never mingling your Libra payments with your Facebook data so it can’t be used for ad targeting. Your real identity won’t be tied to your publicly visible transactions. But Facebook/Calibra and other founding members of the Libra Association will earn interest on the money users cash in that is held in reserve to keep the value of Libra stable.</p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" src="https://techcrunch.com/wp-content/uploads/2019/06/Facebook-Calibra.png?w=680" alt="" class="wp-image-1845396"/></figure></div>



<p>Facebook plans to develop Libra into a “global coin”, pegging it to “well-known currencies” such as the US dollar and British pound in a bid to prevent the “wild swings” of conventional cryptocurrencies such as bitcoin and Ethereum. This is one of the first red flags. This is less a cryptocurrency than it is an attempt at a <a href="https://en.wikipedia.org/wiki/Stablecoin">stablecoin</a>. As such&#8230; it isn&#8217;t even really moving into the cryptocurrency space but more the space of fiat banking.</p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" loading="lazy" width="500" height="244" src="https://images.paulspoerry.com/2019/06/andreas_libra-500x244.png" alt="" class="wp-image-17804" srcset="http://images.paulspoerry.com/2019/06/andreas_libra-500x244.png 500w, http://images.paulspoerry.com/2019/06/andreas_libra-300x146.png 300w, http://images.paulspoerry.com/2019/06/andreas_libra-768x374.png 768w, http://images.paulspoerry.com/2019/06/andreas_libra.png 909w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<p>If you’re wondering about Libra’s implications on the future of payments: stop it because Joshua Davis has it all figured out. </p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" loading="lazy" width="500" height="501" src="https://images.paulspoerry.com/2019/06/joshuaDavis_libra-500x501.png" alt="" class="wp-image-17805" srcset="http://images.paulspoerry.com/2019/06/joshuaDavis_libra-500x501.png 500w, http://images.paulspoerry.com/2019/06/joshuaDavis_libra-150x150.png 150w, http://images.paulspoerry.com/2019/06/joshuaDavis_libra-300x300.png 300w, http://images.paulspoerry.com/2019/06/joshuaDavis_libra-768x769.png 768w, http://images.paulspoerry.com/2019/06/joshuaDavis_libra.png 905w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<p>Facebook won’t fully control Libra, but instead get just a single vote in its governance like other founding members of the Libra Association, including Visa, Uber, and Andreessen Horowitz, which have invested at least $10 million each into the project’s operations. The association will promote the open-sourced Libra Blockchain and developer platform with its own Move programming language, plus sign up businesses to accept Libra for payment and even give customers discounts or rewards. <br><br>So yeah&#8230; this will all be tied together and of course, since Facebook really is a data company you can assume that your purchases will help inform companies in order to be able to target you (even if indirectly).</p>



<p>Early bitcoin core developer&nbsp;Peter Todd, a well-known industry figure and an applied cryptography consultant, and outspoken Bitcoin maximalist didn’t mince his words. </p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" loading="lazy" width="428" height="800" src="https://images.paulspoerry.com/2019/06/peterTodd_libra-428x800.png" alt="" class="wp-image-17806" srcset="http://images.paulspoerry.com/2019/06/peterTodd_libra-428x800.png 428w, http://images.paulspoerry.com/2019/06/peterTodd_libra-161x300.png 161w, http://images.paulspoerry.com/2019/06/peterTodd_libra-768x1435.png 768w, http://images.paulspoerry.com/2019/06/peterTodd_libra.png 822w" sizes="(max-width: 428px) 100vw, 428px" /></figure></div>



<p>Libra runs on a permissioned blockchain, which means that only companies in the Libra Association can mine it/control it. After five years they say they will transition to a permissionless chain. Except&#8230;  no blockchain has ever moved from permissioned to permissionless. Also&#8230; anybody familiar with Facebook&#8217;s constantly moving permissions on the social platform?  Yeah. It&#8217;s nothing more than a private global federal bank.</p>



<blockquote class="wp-block-quote"><p>The root problem with conventional currency is all the trust that&#8217;s required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust. Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve. We have to trust them with our privacy, trust them not to let identity thieves drain our accounts. Their massive overhead costs make micropayments impossible. &#8211; <a href="https://satoshi.nakamotoinstitute.org/posts/p2pfoundation/1/#selection-45.1-45.539">Satoshi Nakamoto</a> </p></blockquote>



<figure class="wp-block-embed-twitter aligncenter wp-block-embed is-type-rich is-provider-twitter"><div class="wp-block-embed__wrapper">
<blockquote class="twitter-tweet" data-width="500" data-dnt="true"><p lang="en" dir="ltr">Is Facebook&#39;s Libra a real blockchain? No.<br><br>Will it compete against <a href="https://twitter.com/hashtag/Bitcoin?src=hash&amp;ref_src=twsrc%5Etfw">#Bitcoin</a> and truly open, public blockchains? Never. <a href="https://twitter.com/hashtag/LibreNotLibra?src=hash&amp;ref_src=twsrc%5Etfw">#LibreNotLibra</a><a href="https://t.co/MQkpPUuedE">https://t.co/MQkpPUuedE</a></p>&mdash; Andreas M. Antonopoulos (@aantonop) <a href="https://twitter.com/aantonop/status/1140953685809348608?ref_src=twsrc%5Etfw">June 18, 2019</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</div></figure>



<blockquote class="wp-block-quote"><p>What Facebook, or any company like Facebook, is proposing is not a cryptocurrency. It doesn’t have any of the fundamental characteristics of cryptocurrency. It doesn’t stand on the five pillars of an open blockchain. In fact, it has none of those. <strong>&#8211;</strong><a href="https://twitter.com/aantonop/status/1140953685809348608">Andreas M. Antonopoulos</a>The five pillars: open, public, neutral, censorship-resistant, and borderless. </p></blockquote>



<p><strong>Libra</strong>:</p>



<ul><li>Open&#8230; naw, total opposite. Highly centralized. It costs $10 million USD to be a node.</li><li>Public? Nope&#8230; Run by an organization that paid $10m a pop to be included.</li><li>Neutral &#8211; No way&#8230; how could it be? It&#8217;s backed by multiple, government created, fiat currencies. To build on many features of Libra’s blockchain, developers must seek permission from Facebook and its partners who administer it.</li><li>Censorship-resistant &#8211; again, nope. Its chain isn&#8217;t even&#8230;  see above&#8230; to build on many features of Libra’s blockchain, developers must seek permission from Facebook and its partners who administer it.</li><li>Borderless &#8211; Can you use Facebook in China? Messenger? Whatsapp?  or would you simply do like the majority of Chinese and use WeChat and Renren? They use those for a reason after all.</li></ul>



<p>What they are building might be more akin to a better version of PayPal. They will also share info with government authorities &#8211; they&#8217;ve not said which ones but how can they be borderless, censorship-resistant, neutral, etc. <strong><em>AND</em></strong> comply with an individual nation-state at the same time?

</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.paulspoerry.com/2019/facebook-announces-libra-cryptocurrency-its-not-a-cryptocurrency/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
