White House Releases Transcript of Trump and Comey Dinner Meeting

The White House has announced that the audio recording of the dinner meeting that occurred between President Donald J. Trump and then FBI Director James Comey was accidentally deleted by Eric Trump when he inadvertently recorded an episode of “Stormfront News” over the meeting audio. However, the White House is now pleased to make available a 100% accurate, verbatim transcript of that meeting that had already been prepared. In this transcript, The President of the United States Donald J. Trump is shown by P:, and James Comey is shown by C:.

P: Jim, come right in over here next to me! C’mon, closer. Give me a big hug! So glad you could make it!

C: Thank you Mr. President. It’s a tremendous honor to be here. You know how much I’ve admired you for so many years. I was beginning to become concerned when you didn’t return any of my many calls asking to keep my job as FBI Director. I feared that you didn’t want to talk to me any more and that my position was in jeopardy.

P: Nonsense Jim. You know how I feel about you. I’ve just been extremely busy. Running this great country leaves me no time for any recreation, any fun — it’s the toughest job in the world and it’s all work. Let’s sit down over here at this small, intimate table and get started with dinner. Would you prefer the Filet-O-Fish or the McNuggets?

C: The fish would be just fine, Mr. President.

P: Here you go, Jim. Take two ketchup packets. I can manage with only one.

C: Thank you, Mr. President. The stories I’ve heard about your generosity are obviously true.

P: Sorry there are no fries. I think Sean stole them from the bag.

C: No problem, sir.

P: Now Jim, I know you’re desperate to keep your job as FBI Director, and I want to be clear that I don’t expect anything from you in return for staying in that position.

C: That makes me feel much better, sir.

P: In particular, all those faxes you sent me offering your personal loyalty were totally unnecessary. All I expect from you is loyalty to the United States of America. I don’t matter at all. It’s this wonderful, diverse country and its wonderful, multicultural citizens that we care about. The vast cornucopia of diversity that makes the United States of America like the proverbial shining city on the hill.

C: You have such a wonderful way with words, Mr. President. You certainly have the best words.

P: Thanks Jim. And I want you to take all of your investigations wherever they need to go. If they lead to Vladimir, or Eric, or Ivanka, or Jared, or Flynn — I don’t want you to back off by one tiny iota. If they’re guilty, they’re guilty, and should be treated like every other simple, ordinary person just like me. I expect you to aspire to my ethical standards, and apply those lofty heights to your daily work at the FBI, just as I’ve applied them every day in my own businesses.

C: That’s a very tall order Mr. President. I’m not sure that I’m enough of a man to meet your standards.

P: I have faith in you, Jim. Now get back to your office and make me proud.

C: I’ll do my best, sir. And thank you, sir. You’re a great human being.

— End of Recording —

– – –

–Lauren–

Boom! Anti-Google Propaganda Fills My Inbox!

Well, this is interesting. Shortly after I yesterday announced my new “Questions I’m Asked About Google” live video streams — still currently scheduled to launch 10:30 AM PDT (GMT-7, 17:30 UTC) tomorrow morning (June 7) — than my main inbox began flooding with anti-Google hate mail. It can’t be coincidental, and some of it appears to be coordinated.

For more information about this new live streaming effort, including links for viewing, asking questions, and directly participating, please see:

https://lauren.vortex.com/2017/06/05/announcing-questions-im-asked-about-google-live-video-streams

I had been debating whether or not I should address (e.g. “rant”) at the start of these streams about current crazy stories attacking Google. Now I don’t see how I can reasonably avoid doing this. OK, if that’s the way it’s gotta be!

Two of the beauts I’m considering touching on tomorrow morning relate to this email deluge over the last 24 hours.

One is messages I’m receiving about an article on a wacko (but relatively major) anti-Muslim site, that usually spends much of their time trying to sell the false story that Google Search “favors” Islam. Well, now they’re even upset about Google Doodles.

They claim that Google celebrated the oppression of women with a home page Doodle of a “Disneyfied veiled Muslima” on 31 May. So I had to go back and dig this one up.

Typical fake news bull being passed around as if it were real. The Doodle in question showed a representation of famed female architect Zaha Hadid, who won the Pritzker Architecture Prize on that day in 2004. And she’s not wearing a veil.

Not even close, anti-Muslim idiots.

Then I started digging through all the hate mail being triggered by an inflammatory new article in “The Intercept” (nope, I’m not giving them any link juice!) which falsely asserts evil in Google’s plans for an ad blocking system for obnoxious ads (to be deployed in their Chrome browser), in conjunction with their upcoming full launch of “Funding Choices” (which is actually a direct descendant of their now discontinued “Google Contributor” system).

Unfortunately, Google (as is all too typical with them in many cases) has not explained this very well, which creates a vacuum that deceptive articles like those from “The Intercept” fill with their own propaganda, and then the false conspiracy theories take flight en masse.

So I guess I’ll probably need to touch on this area as well tomorrow morning.

Yep, we’ll see how it goes. Please let me know if you have any questions and/or wish to participate, and again for more info (including possible scheduling provisos), please see:

https://lauren.vortex.com/2017/06/05/announcing-questions-im-asked-about-google-live-video-streams

Thanks all.

–Lauren–

Google Security’s User Confusion Continues

As I’ve noted many times, Google has world-class security and privacy teams. Great people.

But at least judging from the Google-related queries I get in my inbox every day, Google’s expanding efforts to warn users about perceived security issues are sowing increasing confusion and in some cases serious concerns, especially among nontechnical users who depend upon Google’s products and services in their daily lives.

A new example popped up today that I’ll get to in a moment, but I’ve been discussing these issues for quite a while, e.g.:

“When Google’s Chrome Security Warnings Can Do More Harm Than Good” –https://lauren.vortex.com/archive/001157.html

and:

“Here’s Where Google Hid the SSL Certificate Information That You May Need” –
https://lauren.vortex.com/2017/01/28/heres-where-google-hid-the-ssl-certificate-information-you-may-need

In a nutshell, Google’s continuing efforts at increasing user security — while utterly justifiable at the technical level — continue to marginalize many users who don’t really understand what Google is doing, are confused by Google’s security and other warnings, can’t effectively influence websites with “poor” security to make security improvements, and have no alternatives to accessing those sites in any case.

These are real people — I believe many millions of them — and I do not believe that Google really understands how important they are and how Google is leaving them behind.

Today brought yet another illustrative example that yes, even confused me for a time.

It involves cat food.

A friend forwarded me an email from PetSmart that included a link for an individualized 30% off coupon that they intended to use to buy cat food. That’s a damned good coupon, especially for those of us who aren’t rolling in dough. I wish I had a coupon like that today for Leela the Siamese Snowshoe.

The concern with this email was that every time the user clicked on the link in Gmail to access the site where the coupon could be printed, Gmail popped a modal security warning:

“Suspicious link – This link leads to an untrusted site. Are you sure you want to proceed to click email-petsmart.com?”

You can see a screenshot at the bottom of this post.

The obvious questions: What the hell does “suspicious link” mean in this context? What does Google mean by “untrusted site” in this scope?

There are no links to explanations, and if you Google around you can find lots of people asking similar questions about this class of Gmail warning, but no definitive answers, just lots of (mostly uninformed) speculation.

So I spent about 15 minutes digging this one down. Is email-petsmart.com a phishing domain targeting PetSmart users? Apparently not. It’s registered to ExactTarget, Inc. and has been registered since 2012. So while there’s no obvious authoritative mention of PetSmart there, my experience leads me to believe that they’re most likely a legit marketing partner of PetSmart, providing those emails and coupon services.

Of course, I still have no information about why Google is tagging them as suspicious. Is it the lack of https: security on the URL? Is it some aspect of their email-petsmart naming schema?

Damned if I know. Google isn’t telling me. And how would the average non-techie be expected to unravel any of this?

I told the user to go ahead and click the link. They got their coupon. Their kitties should be happy.

I’m not happy.

In the real world, most users don’t understand this stuff at the level they need to make truly informed decisions. So they’re forced — simply to get on with their lives every day — to click through such warnings blindly, to get to where they need to go.

And make no mistake about it, these kinds of scenarios are teaching these users absolutely abysmal security habits.

Google is terrific at tech. But Google is still struggling when it comes to understanding the broad range of their users and those users’ needs — particularly the non-techies — and especially how to communicate with those users effectively.

Google can do much better.

–Lauren–

Fighting Government Crippled Encryption by Turning It Off Entirely!

Within hours of the terrible terrorist attack in Manchester earlier this week, UK politicians were already using the tragedy as a springboard to push their demands that Internet firms cripple their encryption systems and deploy a range of other Orwellian measures that would vastly weaken the privacy and security of honest citizens — while handing terrorists and other criminals the keys to our private lives, including our financial and other personal information.

This same thuggish mindset is taking root in other parts of the world, often combined with hypocritical “data localization” requirements designed to make individual nations’ citizens as vulnerable as possible to domestic surveillance operations.

There are basically four ways in which firms can react to these draconian government demands.

They could simply comply, putting their users at enormous and escalating risk, not only from government abuse but also from criminals who would exploit the resulting weak encryption environments (while using “unapproved” strong encryption to protect their own criminal activities). We could expect some firms to go this route in an effort to protect their financial bottoms lines, but from an ethical and user trust standpoint this choice is devastating.

Firms could refuse to comply. Litigation might delay the required implementation of crippled encryption, or change some of its parameters. But in the final analysis, these firms must obey national laws where they operate, or else face dramatic fines and other serious sanctions. Not all firms would have the financial ability to engage in this kind of battle — especially given the very long odds of success.

Of course, firms could indeed choose to withdraw from such markets, perhaps in conjunction with geoblocking of domestic users in those countries to meet government prohibitions against strong encryption. Pretty awful prospects.

There is another possibility though — that I’ll admit up front would be highly controversial. Rather than crippling those designated encryption systems in those countries under government orders, firms could choose to disable those encryption systems entirely!

I know that this sounds counterintuitive, but please hang with me for a few minutes!

In this context we’re talking mainly about social media systems where (at least currently) there are no government requirements that messages and postings be encrypted at all. For example, we’re not speaking here of financial or medical sites that might routinely have their own encryption requirements mandated by law (and frankly, where governments usually already have ways of getting at that data).

What governments want now is the ability to spy on our personal Internet communications, in much the same manner as they’ve long spied on traditional telephone voice communications.

An axiom of encryption is that in most situations, weak encryption can be much worse for users than no encryption at all! This may seem paradoxical, but think about it. If you know that you don’t have any encryption at all, you’re far more likely to take care in what you’re transmitting through those channels, since you know that they’re vulnerable to spying. If you believe that you’re protected by encryption, you’re more likely to speak freely.

But the worst case is if you believe that you’re protected by encryption but you really aren’t, because the encryption system is purposely weak and crippled. Users in this situation tend to keep communicating as if they were well protected, when in reality they are highly vulnerable.

Perhaps worse, this state of affairs permits governments to give lip service to the claim that they favor encryption — when in reality the crippled encryption that they permit is a horrific security and privacy farce.

So here’s the concept. If governments demand weak encryption, associated legal battles have ended, and firms still want to serve users in the affected countries, then those firms should consider entirely disabling message/posting encryption on those social media platforms in the context of those countries — and do so as visibly and loudly as possible.

This could get complicated quickly when considering messages/posts that involve multiple countries with and without encryption restrictions, but basically whenever user activities would involve nations with those restrictions, there should be warnings, banners, perhaps even some obnoxious modal pop-ups — to warn everyone involved that these communications are not encrypted — and to very clearly explain that this is the result of government actions against their own citizens. 

Don’t let governments play fast and loose with this. Make sure that users in those countries — and users in other countries that communicate with them — are constantly reminded of what these governments have done to their own citizens.

Also, strong third-party encryption systems not under government controls would continue to be available, and efforts to make these integrate more easily with the large social media firms’ platforms should accelerate.

This is all nontrivial to accomplish and there are a variety of variations on the basic concept. But the goal should be to make it as difficult as possible for governments to mandate crippled encryption and then hypocritically encourage their citizens to keep communicating on these systems as if nothing whatever had changed.

We all want to fight terrorism. But government mandates weakening encryption are fundamentally flawed, in that over time they will not be effective at preventing evildoers from using strong encryption, but do serve to put all law-abiding citizens at enormous risk.

We must resist government efforts to paint crippled encryption targets on the backs of our loved ones, our broader societies, and ourselves.

–Lauren–

 

Is Google’s New “Store Sales Measurement” System a Privacy Risk?

Within hours of Google announcing their new “Store Sales Measurement” system, my inbox began filling with concerned queries. I held off responding on this until I could get additional information directly from Google. With that now in hand I feel comfortable in addressing this issue.

Executive Summary: I don’t see any realistic privacy problems with this new Google system.

In a nutshell, this program — similar in some respects to a program that Facebook has been operating for some time — provides data to advertisers that helps them determine the efficacy of their ads displayed via Google when purchases are not made online.

The crux of the problem is that an advertiser can usually determine when there are clicks on ads that ultimately convert to online purchases via those ads. But if ads are clicked and then purchases are made in stores, that information is routinely lost.

Our perception of advertising has always been complex — to call it love/hate would be a gross understatement. But the reality is that all of this stuff we use online has to be paid for somehow, even though we’ve come to expect most it to be free of direct charges.

And with the rise of ad blockers, advertisers are more concerned than ever that their ads are relevant and effective (and all else being equal, studies show that most of us prefer relevant ads to random ones).

Making this even more complicated is that the whole area of ad personalization is rife with misconceptions.

For example, the utterly false belief that Google sells the personal information of their users to advertisers continues to be widespread. But in fact, Google ad personalization takes place without providing any personal data to advertisers at all, and Google gives users essentially complete control over ad personalization (including the ability to disable it completely), via their comprehensive settings at:

https://www.google.com/settings/ads

Google’s new Store Sales Measurement system operates without Google obtaining individual users’ personal purchasing data. The system is double-blind and deals only with aggregated information about the value of total purchases. Google doesn’t learn who made a purchase, what was purchased, or the individual purchase prices. 

Even though this system doesn’t involve sharing of individual users’ personal data, an obvious question I’ve been asked many times over the last couple of days is: “Where did I give permission for my purchase data to be involved in a program like this at all, even if it’s only in aggregated and unidentified forms?”

Frankly, that’s a question for the bank or other financial institution that issues your credit or debit card — they’re the ones that have written their own foundational privacy policies. 

But my sense is that Google has bent over backwards to deploy their new system with additional layers of user privacy protections that go far beyond the typical privacy policies of those institutions themselves.

My bottom line on all this is that, yeah, I understand why many persons are feeling a bit nervous about this kind of system. But in the real world, we still need advertising to keep the Web going, and when a firm has jumped through the hoops as Google has done to increase the value of their advertising without negatively impacting user privacy in the process, I really don’t have any privacy or other associated concerns.

I only wish that all firms showed this degree of diligence.

Don’t hold your breath waiting for that.

–Lauren–

The Coming Fascist Internet

Originally posted November 13, 2011

Around four decades ago or so, at the U.S. Defense Department funded ARPANET’s first site at UCLA — what would of course become the genesis of the global Internet — I spent a lot of time alone in the ARPANET computer room. I’d work frequently at terminals sandwiched between two large, noisy, minicomputers, a few feet from the first ARPANET router — Interface Message Processor (IMP) #1, which empowered the “blindingly fast” 56 Kb/s ARPANET backbone. Somewhere I have a photo of the famous “Robby the Robot” standing next to that nearly refrigerator-sized cabinet and its similarly-sized modem box.

I had a cubicle I shared elsewhere in the building where I also worked, but I kept serious hacker’s hours back then, preferring to work late into the night, and the isolation of the computer room was somehow enticing.

Even the muted roar of the equipment fans had its own allure, further cutting off the outside world (though likely not particularly good for one’s hearing in the long run).

Occasionally in the wee hours, I’d shut off the room’s harsh fluorescent lights for a minute or two, and watch the many blinking lights play across the equipment racks, often in synchronization with the pulsing and clicking sounds of the huge disk drives.

There was a sort of hypnotic magic in that encompassing, flickering darkness. One could sense the technological power, the future coiled up like a tight spring ready to unwind and energize many thousands of tomorrows.

But to be honest, there was little then to suggest that this stark room — in conjunction with similar rooms scattered across the country at that time — would trigger a revolution so vast and far-reaching that governments around the world, decades later, would cower in desperate efforts to leash it, to cage its power, to somehow turn back the clock to a time when communications were more firmly under the thumbs of the powers-that-be.

There were some clues. While it was intended that the ARPANET’s resource sharing capabilities would be the foundation of what we now call the “cloud,” the ARPANET was (somewhat to the consternation of various Defense Department overseers) very much a social space from the beginning.

Starting very early on, ARPANET communications began including all manner of personal discussions and interests, far beyond the narrow confines of “relevant” technical topics. A “wine tasting enthusiasts” mailing list triggered reprimands from DoD when it became publicly known thanks to a magazine article, and I won’t even delve here into the varied wonders of the “network hackers” and “mary hartman” mailing lists.

In fact, the now ubiquitous mailing list “digest” format was originally invented as a “temporary” expedient when “high volumes” of traffic (by standards of the time) threatened the orderly distribution of the science-fiction and fantasy oriented “sf-lovers” mailing list. Many other features that we take for granted today in email systems were created or enhanced largely in reaction to these sorts of early “social” communications on the very young Net.

The early ARPANET was mostly restricted to the U.S., but as international points began to come online the wonders expanded. I still remember the day I found myself in a “talk” (chat) link with a party at a military base in Norway — my first international live contact on the Net that I knew of. I remember thinking then that someday, AT&T was going to start getting concerned about all this.

The power of relatively unfiltered news was also becoming apparent back then. One of my projects involved processing newswire data (provided to me over the ARPANET on a friendly but “unofficial” basis from another site) and building applications to search that content and alert users (both textually and via a synthesized voice phone-calling system — one of my other pet projects) about items of interest.

For much of the Net’s existence, both phone companies and governments largely ignored (or at least downplayed) the ARPANET, even as it evolved toward the Internet of today.

AT&T and the other telcos had explicitly expressed disinterest early on, and even getting them to provide the necessary circuits had at times been a struggle. Governments didn’t really seem to be worried about an Internet “subculture” that was limited mostly to the military, academia, and a variety of “egghead” programmers variously in military uniforms and bell-bottoms, whether sporting crew cuts, scruffy longhairs, or somewhere in-between.

But with the fullness of time, the phone companies, cable companies, governments, and politicians galore came to most intensely pay attention to the Internet, as did the entertainment industry behemoths and a broad range of other “intellectual property” interests.

Their individual concerns actually vary widely at the detailed level, but in a broader context their goals are very much singular in focus.

They want to control the Internet. They want to control it utterly, completely, in every technologically possible detail (and it seems in various technically impossible ways as well).

The freedom of communications with which the Internet has empowered ordinary people — especially one-to-many communications that historically have been limited to governments and media empires themselves — is viewed as an existential threat to order, control, and profits — that is, to historical centers of power.

Outside of the “traditional” aspects of government control over their citizenries, another key element of the new attempts to control the Net are desperate longings by some parties to turn back the technological clock to a time when music, movies, plus other works could not so easily be duplicated and disseminated in both “authorized” and “unauthorized” fashions.

The effective fall of copyright in this context was preordained by human nature (we are physical animals, and the concept of non-physical “property” plays against our natures) and there’s been a relentless “march of bits” — with text, music, and movies entering the fray in turn as ever more data could be economically stored and transferred.

In their efforts to control people and protect profits, governments and associated industries (often in league with powerful Internet Service Providers — ISPs — who in some respects are admittedly caught in the middle), seem willing to impose draconian, ultimately fascist censorship, identification, and other controls on the Internet and its users, even extending into the basic hardware in our homes and offices.

I’ve invoked fascism in this analysis, and I do not do so lightly.

The attacks on fundamental freedoms to communicate that are represented by various government repression of the Internet around the world, and in the U.S. by hypocritical legislation like PROTECT IP and SOPA (E-PARASITE), are fundamentally fascist in nature, despite between wrapped in their various flags of national security, anti-piracy profit protection, motherhood, and apple pie.

Anyone or anything that is an enabler of communications not willingly conforming to this model are subject to attack by authorities from a variety of levels — with the targets ranging from individuals like you and me, to unbiased enablers of organic knowledge availability like Google.

For all the patriotic frosting, the attacks on the Internet are really attacks on what has become popularly known as the 99%, deployed by the 1% powers who are used to having their own way and claiming the largest chunks of the pie, regardless of how many ants (that’s us!) are stomped in the process.

This is not a matter of traditional political parties and alliances. In the U.S., Democrats and Republican legislators are equally culpable in these regards.

This is a matter of raw power that transcends other ideologies, of the desire of those in control to shackle the Internet to serve their bidding, while relegating free communications for everyone else to the dustbin of history.

It is very much our leaders telling us to sit down, shut up, and use the Internet only in the furtherance of their objectives — or else.

To me, these are the fundamental characteristics of a fascist world view, perhaps not in the traditional sense but clearly in the ultimate likely impacts.

The Internet is one of the most important tools ever created by mankind. It certainly ranks with the printing press, and arguably in terms of our common futures on this tiny planet perhaps even with fire.

The question is, are we ready and willing to fight for the Net as it should be in the name of civil rights and open communications? Or will we sit back compliantly, happily gobble down the occasional treats tossed in our direction, and watch as the Internet is perverted into a monstrous distortion to control speech and people alike, rather than enabling the spread of freedom.

Back in that noisy computer room so many years ago, I couldn’t imagine that I was surrounded by machines and systems that would one day lead to such a question, and to concerns of such import.

The blossoming we’ve seen of the Internet was not necessarily easy to predict back then. But the Internet’s fascist future is much more clear, unless we fight now — right now — to turn back the gathering evil.

–Lauren–

Netflix Blocking, Google, Android, and Donald Trump

Netflix has now confirmed that they have begun blocking Android phones that have been rooted and/or even have unlocked bootloaders from downloading the Netflix app from the Google Play Store. While the app can still be sideloaded and still runs, we can reasonably assume that this is a temporary reprieve in those respects.

Let’s be crystal clear about what’s happening here. Google is moving their Android security framework in directions that will encourage popular app creators to broadly refuse installation on rooted/bootloader-unlocked phones.

This will inevitably put all users at greater risk by making it impossible in a practical sense for most concerned users to modify their phones for protection against malware, spyware, and government intrusions.

Despite the valiant efforts of Google toward making the Android environment a safe one, we are living in a time where a sociopathic fascist controls the federal government. We cannot tolerate total control of our phones being in the hands of any individual firms, even benign ones like Google.

I’ll have more to say about this. Much more.

–Lauren–

WARNING: Antivirus sites may be helping to SPREAD the current global malware ransomware (WannaCry) attack!

It has been reported that a researcher discovered that spread of the current worldwide ransomware attack can be halted after he registered the domain:

iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com

and built a sinkhole website that the malware could check. Reportedly the malware does not continue spreading if it can reach this site. HOWEVER, various antivirus websites/services are now reportedly adding that domain to their “bad domain” lists! If sites infected with this malware are unable to reach that domain due to their firewalls incorporating rules from antivirus sites that include a block for that domain, the malware will likely continue spreading across their vulnerable computers (which must also still be patched to avoid infection by similar exploits). Your systems MUST be able to access the domain above if this malware blocking trigger is to be effective, according to the current reports that I’m receiving!

–Lauren–

Announcing the “Google Issues” Mailing List

UPDATE (12 May 2017): Readers have been asking me about this new list’s scope. To be clear, it is not an “announcement-only” list. Reader participation is very much encouraged, including Google-related questions. Thanks again!

– – –

Nobody can accuse me of starting too many Internet mailing lists. My existing lists (PRIVACY Forum, PFIR, and NNSquad) have been running continuously on the order of 26, 19, and 11 years respectively. Remarkably, I routinely get notes from subscribers who have been on these lists since their creation and claim to have been reading all of my associated messages — apparently without suffering any obvious brain damage to date.

Even relatively new readers will know by now that postings relating to Google have long been a very frequent component of these lists, and of my blog (which itself is around 14 years old).

The volume of Google-related postings seems likely to only be increasing. So with hopefully only relatively minor risk to the spacetime continuum, I have created a new mailing list to deal exclusively with all manner of Google-centric issues (and associated Alphabet, Inc. topics as well).

The subscription page (and archive information) for this new moderated mailing list is at:

https://vortex.com/google-issues

While a variety of postings specific to Google will continue to appear in my other mailing lists as well, this new list is my intended venue for additional wide-ranging discussions and other postings related to Google and Alphabet, that I believe will be of ongoing interest — much of which will not appear in my other lists.

Google of course has no role in the operation of my lists or blog, and while I have consulted to them in the past I am not currently doing so — all of my opinions expressed in my lists and other venues are mine alone.

I’m looking forward to seeing you over on the Google Issues mailing list!

Thanks very much.

–Lauren–

Google’s Achilles’ Heel

A day rarely passes when somebody doesn’t send me a note asking about some Google-related issue. These are usually very specific cases — people requesting help for some particular Google product or often about account-related issues. Sometimes I can offer advice or other assistance, sometimes I can’t. Occasionally in the process I get pulled into deeper philosophical discussions regarding Google.

That’s what happened a few days ago when I was asked the straightforward question: “What is Google’s biggest problem?”

My correspondent apparently was expecting me to reply with a comment about some class of technical issues, or perhaps something about a security or privacy matter. So he was quite surprised when I immediately suggested that Google’s biggest problem has nothing per se to do with any of those areas at all.

Google’s technology is superb. Their privacy and security regimes are first-rate and world class. The teams that keep all those systems going are excellent, and I’ve never met a Googler that I didn’t like (well … hardly ever). It’s widely known that I take issue with various aspects of Google’s user support structure and user interface designs, but these are subject to improvement in relatively straightforward ways.

No, Google’s biggest problem isn’t in any of these areas.

Ironically, while Google has grown and improved in so many ways since its founding some 18 years ago, the big problem today remains essentially the same as it did at the beginning.

To use the vernacular, Google’s public relations — their external communications — can seriously suck.

That is not to suggest that the individuals working Google PR aren’t great people. The problem with Google PR is — in my opinion — a structural, cultural dilemma, of the sort that can be extremely difficult for any firm to significantly alter.

This is a dangerous state of affairs, both for Google and its users. Effective external communications ultimately impact virtually every aspect of how individuals, politicians, and governments view Google services and Google itself more broadly. In an increasingly toxic political environment around the world, Google’s institutional tendency —  toward minimal communications in so many contexts — creates an ideal growth medium for Google adversaries and haters to fill the perceived information vacuum with conspiracy theories and false propaganda.

For example, I recently posted Quick Tutorial: Deleting Your Data Using Google’s “My Activity” — which ended up appearing in a variety of high readership venues. Immediately I started seeing comments and receiving emails questioning how I could possibly know that Google was telling the truth about data actually being deleted, in many cases accompanied by a long tirade of imagined grievances against Google. “How can you trust Google?” they ask.

As it happens I do trust Google, and thanks to my period of consulting to them several years ago, I know how these procedures actually operate and I know that Google is being accurate and truthful. But beyond that general statement all I can say is “Trust me on this!”

And therein lies the heart of the dilemma. Only Google can speak for Google, and Google’s public preference for generalities and vagueness on many policy and technical matters is all too often much deeper than necessary prudence and concerns about “Streisand Effect” blowbacks would reasonably dictate.

Google’s external communications problem is indeed their “Achilles’ Heel” — a crucial quandary that if left unchanged will increasingly create the opportunity for damage to Google and its users, particularly at this time when misinformation, government censorship, and other political firestorms are burning widening paths around the globe.

Institutionally entrenched communications patterns cannot reasonably be changed overnight, and a great deal of business information is both fully appropriate and necessary to keep confidential.

But in the case of Google, even a bit more transparency in external communications could do wonders, by permitting the outside world to better understand and appreciate the hard work and diligence that makes Google so worthy of trust — and by leaving the Google haters and their lying propaganda in the dust.

–Lauren–

YouTube’s Dangerous and Sickening Cesspool of “Prank” and “Dare” Videos

UPDATE (December 17, 2017): A YouTube Prank and Dare Category That’s Vast, Disgusting, and Potentially Deadly

– – –

Before we delve into a particularly sordid layer of YouTube and its implications to individuals, society at large, and Google itself, I’ll make my standard confession. Overall, I’m an enormous fan of YouTube. I consider it to be one of the wonders of the 21st century, a seemingly limitless wellspring of entertainment, education, nostalgia, and all manner of other positive traits that I would massively miss if YouTube were to vanish from the face of the Earth. I know quite a few of the folks who keep YouTube running at Google, and they’re all great people.

That said, we’re increasingly finding ourselves faced with the uncomfortable reality that Google has seemingly dragged its collective feet when it comes to making sure that their own YouTube Terms of Service are equitably and appropriately enforced.

I’ve talked about an array of aspects relating to this problem over the years — including Content ID and copyright issues; YouTube channel suspensions, closures, and appeal procedures; and a long additional list that I won’t get into here again right now, other than to note that at Google/YouTube scale, none of this stuff is trivial to deal with properly, to say the least.

Recently the spotlight has been on YouTube’s hate speech problems, which I’ve discussed in What Google Needs to Do About YouTube Hate Speech and in a variety of other posts. This issue in particular has been in the news relating to the 2016 election, and due to a boycott of YouTube by advertisers concerned about their ads appearing alongside vile hate speech videos that (by any reasonable interpretation of the YouTube Terms of Service) shouldn’t be permitted on the platform in the first place.

But now I’m going to lift up another damp rock at YouTube and shine some light underneath — and it’s not pretty under there, either.

The issue in focus today is YouTube’s vast cornucopia of so-called “prank” – “dare” – “challenge” (PDC) videos, which range from completely innocuous and in good fun, to an enormous array of videos portraying vile, dangerous, harmful, and often illegal activities.

You may never have experienced this particular YouTube subculture. YouTube’s generally excellent recommendation engine tends to display new videos that are similar to the videos that you’ve already viewed, so unless you’ve looked for them, you could be completely forgiven for not even realizing that the entire PDC YouTube world even existed. But once you find them, YouTube will make sure that you’re offered a bountiful supply of new ones on a continuing basis.

This category of YouTube videos was flung into the mainstream news over the last few days, with a pair of egregious (but by no means isolated) examples.

In one case, a couple lost custody of young children due to an extensive series of horrific, abusive, “prank” videos targeting those children — that they’ve been publishing on YouTube over a long period. They’re now arguing that the abuse was “faked” — that the children agreed to do the videos, and so on.

But those claims don’t change the outcome of the equation — not in the least. First, young children can’t give meaningful, independent consent in such situations.

And here’s a key point that applies across the entire continuum of these YouTube videos — it usually doesn’t matter whether an abusive prank is faked or not. The negative impact on viewers is the same either way. Even if there is a claim that a vile “prank” was faked, how are viewers to independently judge the veracity of such a statement in many cases?

An obvious example category includes the YouTube “shock collar” prank/challenge videos. What, you didn’t know about those? Just do a YouTube search for:

shock collar

and be amazed. These are at the relative low end of the spectrum — you’re not terribly likely to be seriously injured by a shock collar, but there are indeed some nightmarish exceptions to that generalization.

So in this specific category you’ll find every imaginable combination of people “pranking” each other, challenging each other, and otherwise behaving like stupid morons with electricity in contact with their bodies.

Are all of these videos legit? Who the hell knows? I’d wager that some are faked but that most are real — but again as I noted above, whether or not such videos are faked or not isn’t the real issue. Potential copycats trying to outdo them won’t know or care.

Even if we consider the shock collar videos to be on the lower end of the relative scale under discussion, it quickly becomes obvious why such videos escalate into truly horrendous activities. Many of these YouTube channel operators openly compete with each other (or at least, claim to be competing — they could be splitting their combined monetization revenue between themselves for all we can tell from the outside) in an ever accelerating race to the bottom, with ever more vile and dangerous stunts.

While one can argue that we’re often just looking at stupid people voluntarily doing stupid things to each other, many of these videos still clearly violate Google’s Terms of Service, and it appears, anecdotally at least, that the larger your subscriber count the less likely that your videos will be subjected to a rigorous interpretation of those terms.

And then we have another example that’s currently in the news — the YouTube channel operator who thought it would be a funny “prank” to remove stop signs from intersections, and then record the cars speeding through. Not much more needs to be said about this, other than the fact that he was ultimately arrested and felony charged. Now he’s using his YouTube channel to try drum up funds for his lawyers.

One might consider the possibility that since he was arrested, that video might serve as an example of what others shouldn’t do. But a survey of “arrested at the end of doing something illegal” videos and their aftermaths suggests that the opposite result usually occurs — other YouTube channel operators are instead inspired to try replicate (or better yet from their standpoints, exceed) those illegal acts — without getting caught (“Ha ha! You got arrested, but we didn’t!”).

As in the case of YouTube hate speech, the key here is for Google to seriously and equitably apply their own Terms of Service, admittedly a tough (but doable!) job at the massive scale that Google and YouTube operate.

To not act proactively and effectively in this area is too terrible to risk. Non-USA governments are already moving to impose potentially draconian restrictions and penalties relating to YouTube videos. Even inside the USA, government crackdowns are possible since First Amendment protections are not absolute, especially if the existing Terms of Service are seen to be largely paper tigers.

These problems are by no means isolated only to YouTube/Google. But they’ve been festering below the surface at YouTube for years, and the public attention that they’re now receiving means that the status quo is no longer tenable.

Especially for the sake of the YouTube that I really do love so much, I fervently hope that Google starts addressing these matters with more urgency and effectiveness, rather than waiting for governments to begin disastrously dictating the rules.

–Lauren–

Quick Tutorial: Deleting Your Data Using Google’s “My Activity”

UPDATE (May 1, 2019): A Major New Privacy-Positive Move by Google

– – –

Since posting The Google Page That Google Haters Don’t Want You to Know About last week, I’ve received a bunch of messages from readers asking for help using Google’s “My Activity” page to control, inspect, and/or delete their data on Google.

The My Activity portal is quite comprehensive and can be used in many different ways, but to get you started I’ll briefly outline how to use My Activity to delete activity data.

Some words of warning, however. You cannot revoke deletions once they’ve been made, and deleting your data on Google can negatively affect how well those services will perform for you going forward, since you’ll be moving back toward “generic” interactions, rather than customized ones. So do think carefully before performing broad deletions! (I know that I’d be lost without my YouTube watch history, for example …)

OK, let’s get started.

First, go to:

https://google.com/myactivity

If you’re not logged into a Google account, do so now. Once you’re logged in, you can use the standard account switcher (clicking on the picture or letter at the page upper right) to change accounts.

What you should now see is a reverse chronological list of your activity when logged into that Google account, which you can scroll down starting with Today and working backwards.

If you click on the three vertical dots (henceforth, “the dots”) at a Google service type entry (e.g. Search), you can choose to expand the detailed entries for that level for that date, or delete those entries. If you click on the dots on the Today bar itself, you can choose to delete ALL of the activity entries for Today.

The real power of the My Activity interface comes into play when you click in the upper Search/Filter “by date & product” area.

After you’ve done this, you can activate the search bar by clicking in the bar and typing something, or (my personal preference) by unchecking “All products” further down.

Now you can search for activity entries filtered by product type and/or date as you’ve specified. To avoid over-deletion, I strongly recommend not selecting many product types at the same time! (When you click on specific products, the “All products” entry will automatically be unchecked.)

Once you’ve selected at least one specific product type, the Search bar will activate and the “perform this search” magnifying glass icon at the right of the bar will turn dark blue.

You can type queries into the bar to find specific entries, or you can just click on the magnifying glass without a query to list all entries for the selected Google products. If you haven’t changed the “Filter by date” settings at the top to narrow down the dates, the search will cover the default “All time” activity list for those products.

The scrollable page that results from such queries is similar in structure to what you saw for the earlier page that started with Today, and you can interact with it to get more details or delete entries in the same ways.

But look again at the top Search bar now. If you click on the dots at the right of that white Search bar that appears after a query, you’ll see that you now have a “Delete results” option.

You wanted power over your data on Google? Well, you’ve got it. Because if you click “Delete results” it will remove EVERY activity result from that query (or from an empty query entry that lists all results for the specified products). That can mean deleting every activity result from all of the selected products, going back to the relative dawn of time.

My Activity gives you extraordinary power over what sorts of activity data will be collected for your Google accounts, and as we’ve seen the ability to delete data using a variety of parameters and searches. It’s quite a technological work of art.

But again, be careful before invoking these powers. Remember, you can’t undo My Activity deletions. Or to use an old film analogy that many of you might recognize, if you’re going to use powerful incantations like “Klaatu barada nikto” — make damned sure that you pronounce them correctly!

–Lauren–

More Regarding a Terrible Decision by the Internet Archive

Yesterday, in A Terrible Decision by the Internet Archive May Lead to Widespread Blocking, I discussed in detail why the Internet Archive’s decision to ignore Robots Exclusion Standard (RES) directives (in robots.txt files on websites) is terrible for the Internet community and users. I had expected a deluge of hate email in response. But I’ve received no negative reactions at all — rather a range of useful questions and comments — perhaps emphasizing the fact that the importance of the RES is widely recognized.

As I did yesterday, I’ll emphasize again here that the Archive has done a lot of good over many years, that it’s been an extremely valuable resource in more ways than I have time to list right now. Nor am I asserting that the Archive itself has evil motives for its decision. However, I strongly feel that their decision allies them with the dark players of the Net, and gives such scumbags comfort and encouragement.

One polite public message that I received was apparently authored by Internet Archive founder Brewster Kahle (since the message came in via my blog, I have not been able to immediately authenticate it, but the IP address seemed reasonable). He noted that the Archive accepts requests via email to have pages excluded.

This is of course useful, but entirely inadequate.

Most obviously, this technique fails miserably at scale. The whole point of the RES is to provide a publicly inspectable, unified and comprehensively defined method to inform other sites (individually, en masse, or in various combinations) of your site access determinations.

The “send an email note to this address” technique just can’t fly at Internet scale, even if users assume that those emails will ever actually be viewed at any given site. (Remember when “postmaster@” addresses would reliably reach human beings? Yeah, a long, long time ago.)

There’s also been some fascinating discussion regarding the existing legal status of the RES. While it apparently hasn’t been specifically tested in a legal sense here in the USA at least, judges have still been recognizing the importance of RES in various court decisions.

In 2006, Google was sued (“Field vs. Google” — Nevada) for copyright infringement for spidering and caching a website. The court found for Google, noting that the site included a robots.txt file that permitted such access by Google.

The case of Century 21 vs. Zoocasa (2011 — British Columbia) is also illuminating. In this case, the judge found against Zoocasa, noting that they had disregarded robots.txt directives that prohibited their copying content from the Century 21 site.

So it appears that even today, ignoring RES robots.txt files could mean skating on very thin ice from a legal standpoint.

The best course all around would be for the Internet Archive to reverse their decision, and pledge to honor RES directives, as honorable players in the Internet ecosystem are expected to do. It would be a painful shame if the wonderful legacy of the Internet Archive were to be so seriously tarnished going forward by a single (but very serious) bad judgment call.

–Lauren–

A Terrible Decision by the Internet Archive May Lead to Widespread Blocking

UPDATE (23 April 2017):  More Regarding a Terrible Decision by the Internet Archive

– – –

We can stipulate at the outset that the venerable Internet Archive and its associated systems like Wayback Machine have done a lot of good for many years — for example by providing chronological archives of websites who have chosen to participate in their efforts. But now, it appears that the Internet Archive has joined the dark side of the Internet, by announcing that they will no longer honor the access control requests of any websites.

For any given site, the decision to participate or not with the web scanning systems at the Internet Archive (or associated with any other “spidering” system) is indicated by use of the well established and very broadly affirmed “Robots Exclusion Standard” (RES) — a methodology that uses files named “robots.txt” to inform visiting scanning systems which parts of a given website should or should not be subject to spidering and/or archiving by automated scanners.

RES operates on the honor system. It requests that spidering systems follow its directives, which may be simple or detailed, depending on the situation — with those detailed directives defined comprehensively in the standard itself.

While RES generally has no force of law, it has enormous legal implications. The existence of RES — that is, a recognized means for public sites to indicate access preferences — has been important for many years to help hold off efforts in various quarters to charge search engines and/or other classes of users for access that is free to everyone else. The straightforward argument that sites already have a way — via the RES — to indicate their access preferences has held a lot of rabid lawyers at bay.

And there are lots of completely legitimate reasons for sites to use RES to control spidering access, especially for (but by no means restricted to) sites with limited resources. These include technical issues (such as load considerations relating to resource-intensive databases and a range of other related situations), legal issues such as court orders, and a long list of other technical and policy concerns that most of us rarely think about, but that can be of existential importance to many sites.

Since adherence to the RES has usually been considered to be voluntary, an argument can be made (and we can pretty safely assume that the Archive’s reasoning falls into this category one way or another) that since “bad” players might choose to ignore the standard, this puts “good” players who abide by the standard at a disadvantage.

But this is a traditional, bogus argument that we hear whenever previously ethical entities feel the urge to start behaving unethically: “Hell, if the bad guys are breaking the law with impunity, why can’t we as well? After all, our motives are much better than theirs!”

Therein are the storied paths of “good intentions” that lead to hell, when the floodgates of such twisted illogic open wide, as a flood of other players decide that they must emulate the Internet Archive’s dismal reasoning to remain competitive.

There’s much more.

While RES is typically viewed as not having legal force today, that could be changed, perhaps with relative ease in many circumstances. There are no obvious First Amendment considerations in play, so it would seem quite feasible to roll “Adherence to properly published RES directives” into existing cybercrime-related site access authorization definitions.

Nor are individual sites entirely helpless against the Internet Archive’s apparent embracing of the dark side in this regard.

Unless the Archive intends to try go completely into a “ghost” mode, their spidering agents will still be detectable at the http/https protocol levels, and could be blocked (most easily in their entirety) with relatively simple web server configuration directives. If the Archive attempted to cloak their agent names, individual sites could block the Archive by referencing the Archive’s known source IP addresses instead.

It doesn’t take a lot of imagination to see how all of this could quickly turn into an escalating nightmare of “Whac-A-Mole” and expanding blocks, many of which would likely negatively impact unrelated sites as collateral damage.

Even before the Internet Archive’s decision, this class of access and archiving issues had been smoldering for quite some time. Perhaps the Internet Archive’s pouring of rocket fuel onto those embers may ultimately lead to a legally enforced Robots Exclusion Standard — with both the positive and negative ramifications that would then be involved. There are likely to be other associated legal battles as well.

But in the shorter term at least, the Internet Archive’s decision is likely to leave a lot of innocent sites and innocent users quite badly burned.

–Lauren–

The Google Page That Google Haters Don’t Want You to Know About

UPDATE (May 1, 2019): A Major New Privacy-Positive Move by Google

UPDATE (April 24, 2017):  Quick Tutorial: Deleting Your Data Using Google’s “My Activity”

– – –

There’s a page at Google that dedicated Google Haters don’t like to talk about. In fact, they’d prefer that you didn’t even know that it exists, because it seriously undermines the foundation of their hateful anti-Google fantasies.

A core principle of Google hatred is the set of false memes concerning Google and user data collection. This is frequently encapsulated in a fanciful “You are the product!” slogan, despite the fact that (unlike the dominant ISPs and many other large firms) Google never sells user data to third parties.

But the haters hate the idea that data is collected at all, despite the fact that such data is crucial for Google services to function at the quality levels that we have come to expect from Google.

I was thinking about this again today when I started hearing from users reacting to Google’s announcement of multiple user support for Google Home, who were expressing concerns about collection of more individualized voice data (without which — I would note — you couldn’t differentiate between different users).

We can stipulate that Google collects a lot of data to make all of this stuff work. But here’s the kicker that the haters don’t want you to think about — Google also gives you enormous control over that data, to a staggering degree that most Google users don’t fully realize.

The Golden Ticket gateway to this goodness is at:

google.com/myactivity

There’s a lot to explore there — be sure to click on both the three vertical dots near the upper top and on the three horizontal bars near the upper left to see the full range of options available.

This page is a portal to an incredible resource. Not only does it give you the opportunity to see in detail the data that Google has associated with you across the universe of Google products, but also the ability to delete that data (selectively or in its totality), and to determine how much of your data will be collected going forward for the various Google services.

On top of that, there are links over to other data related systems that you can control, such as Takeout for downloading your data from Google, comprehensive ad preferences settings (which you can use to adjust or even fully disable ad personalization), and an array of other goodies, all supported by excellent help pages — a lot of thought and work went into this.

I’m a pragmatist by nature. I worry about organizations that don’t give us control over the data they collect about us — like the government, like those giant ISPs and lots of other firms. And typically, these kinds of entities collect this data even though they don’t actually need it to provide the kinds of services that we want. All too often, they just do it because they can.

On the other hand, I have no problems with Google collecting the kinds of data that provide their advanced services, so long as I can choose when that data is collected, and I can inspect and delete it on demand.

The google.com/myactivity portal provides those abilities and a lot more.

This does imply taking some responsibility for managing your own data. Google gives you the tools to do so — you have nobody but yourself to blame if you refuse to avail yourself of those excellent tools.

Or to put it another way, if you want to use and benefit from 21st century technological magic, you really do need to be willing to learn at least a little bit about how to use the shiny wand that the wizard handed over to you.

Abracadabra!

–Lauren–

Prosecute Burger King for Their Illegal Google Home Attacks in Their Ads

Someone — or more likely a bunch of someones — at Burger King and their advertising agency need to be arrested, tried, and spend some time in shackles and prison cells. They’ve likely been violating state and federal cybercrime laws with their obnoxious ad campaign purposely designed to trigger Google Home devices without the permission of those devices’ owners.

Not only has Burger King admitted that this was their purpose, they’ve been gloating about changing their ads to avoid blocks that Google reportedly put in place to try protect Google Home device owners from being subjected to Burger King’s criminal intrusions.

For example, the federal CFAA (Computer Fraud and Abuse Act) broadly prohibits anyone from accessing a computer without authorization. There’s no doubt that Google Home and its associated Google-based systems are computers, and I know that I didn’t give Burger King permission to access and use my Google Home or my associated Google account. Nor did millions of other users. And it’s obvious that Google didn’t give that permission either. Yet the morons at Burger King and their affiliated advertising asses — in their search for social “buzz” regarding their nauseating fast food products — felt no compunction about literally hijacking the Google Home systems of potentially millions of people, interrupting other activities, and ideally (that is, ideally from their sick standpoint) interfering with people’s home environments on a massive scale.

This isn’t a case of a stray “Hey Google” triggering the devices. This was a targeted, specific attack on users, which Burger King then modified to bypass changes that Google apparently put in place when word of those ads circulated earlier.

Burger King has instantly become the “poster child” for mass, criminal abuse of these devices.  And with their lack of consideration for the sanctity of people’s homes, we might assume that they’re already making jokes about trying to find ways to bill burgers to your credit card without your permission as well. For other dark forces watching these events, this idea could be far more than a joke.

While there are some humorous aspects to this situation — like the anti-Burger King changes made on Wikipedia in response to news of these upcoming ads — the overall situation really isn’t funny at all.

In fact, it was a direct and voluntary violation of law. It was accessing and using computers without permission. Whether or not anyone associated with this illicit stunt actually gets prosecuted is a different matter, but I urge the appropriate authorities to seriously explore this possibility, both for the action itself and relating to the precedent it created for future attacks.

And of course, don’t buy anything from those jerks at Burger King. Ever.

–Lauren–

You Can Make the New Google+ Work Better — If You’re Borg!

Recently, in Google+ and the Notifications Meltdown, I noted the abysmal user experience represented by the new Google+ unified desktop notifications panel — especially for users like me with many G+ followers and high numbers of notifications.

Since then, one observer mentioned to me that opening and closing the notifications panel seemed to load more notifications. I had noticed this myself earlier, but the technique appeared to be unreliable with erratic results, and with large numbers of notifications still being “orphaned” on the useless standalone G+ notifications page.

After a bunch more time wasted on digging into this, I now seem to have a methodology that will (for now at least … maybe) reliably permit users to see all G+ notifications on the desktop notifications panel, in a manner that permits interacting with them that is much less hassle than the standalone notifications page permits.

There’s just one catch. You pretty much have to be Borg-like in your precision to make this work. You can just call me “One of One” for the remainder of this post.

Keeping in mind that this is a “How-to” guide, not a “What the hell is going on?” guide, let’s begin your assimilation.

The new notifications panel will typically display up to around 10 G+ notification “tiles” when it’s opened by clicking on the red G+ notification circle. If you interact in any way with any specific tile, G+ now usually considers it as “read” and you frequently can’t see it again unless you go to the even more painful standalone notifications page.

Here’s my full recommended procedure. Wander from this path at your own risk.

Open the panel on your desktop by clicking the red circle with the notifications count inside. Click on the bottom-most tile. That notification will open. Interact with it as you might desire — add comments, delete spam, etc.

Now, assuming that there’s more than one notification, click the up-arrow at the top of the panel to proceed upward to the next notification. You can also go back downward with the down-arrow, but do NOT at this time touch the left-arrow at the top of the panel — you do not want to return to those tiles yet.

Continue clicking upward through the notifications using that up-arrow — the notifications will open as you proceed. This can be done quite quickly if you don’t need to add comments of your own or otherwise manage the thread — e.g., you can plow rapidly through +1 notifications.

When you reach the last (that is, the top) notification on the current panel, the up-arrow will no longer be available to click.

NOW you can use the left arrow at the top of the panel to return to the notification tiles view. When you’re back on that view, be sure that you under NO circumstances click the “X” on any of those tiles, and do NOT click on the “hamburger” icon (three horizontal lines) that removes all of the tiles. If you interact with either of those icons, whether at this stage or before working your way up through the notifications, you stand a high probability of creating “orphan” notifications that will collect forever on the standalone notifications page rather than ever being presented by the panel!

So now you’re sitting on the tile view. Click on an empty area of the G+ window OUTSIDE the panel. The panel should close.

Assuming that there are more notifications pending, click again on the red circle. The panel will reopen, and if you’ve been a good Borg you’ll see the panel repopulate with a new batch of notifications.

This exact process can be repeated (again, for the time being at least) until all of your notifications have been dealt with. If you’ve done this all precisely right, you’ll likely end up with zero unread notifications on the standalone notifications page.

That’s all there is to it! A user interface technique that any well-trained Borg can master in no time at all! But at least it’s making my G+ notifications management relatively manageable again.

Yep, resistance IS futile.

–Lauren–

Collecting Examples of YouTube Hate Speech Videos and Channels

I am collecting examples of hate speech videos on YouTube, and of YouTube channels that contain hate speech. Please use the form at:

https://vortex.com/yt-speech

to report examples of specific YouTube hate speech videos and/or the specific YouTube channels that have uploaded those videos. For YouTube channels that are predominantly filled with hate speech videos, the channel URL alone will suffice (rather than individual video URLs) and is of particular interest.

For the purposes of this study, “hate speech” is defined to be materials that a reasonable observer would feel are in violation of Google’s YouTube Community Standards Terms of Use here:

https://support.google.com/youtube/answer/2801939

For now, please only report materials that are in English, and that can be accessed publicly. All inputs on this form may be released publicly after verification as part of this project, with the exception of your (optional) name and email address, which will be kept private and will not released or used for any purposes beyond this study.

Thank you for participating in this study to better understand the nature and scope of hate speech on YouTube.

–Lauren–