قالب وردپرس درنا توس
Home / Tips and Tricks / Your private Facebook posts are read by employees

Your private Facebook posts are read by employees



A report from Reuters states that Facebook shares private items with contract workers to train its AI. This means that real people read your private posts. That sounds too familiar.

The report suggests that Facebook is outsourcing this task to an Indian company called Wipro, where up to 260 workers comb up to 700 jobs per day . Each item is matched by two different workers to make sure they are labeled correctly.

What exactly do they do then? The process is ambiguously referred to as "data annotation" ̵

1; they organize and label posts so that AI can better learn what it sees. They note the type of content – for example, a selfie, a meal, or an animal. You must also include the intention of the author. Do you make a joke, try to inspire others or plan an event? The fantasy suggests that the last bit might be a bit dull in certain situations.

Although the report itself is fairly simple, there seems to be some conflicting feelings from Facebook employees (and former employees). Nipun Mathur, the company's director of product management, told Reuters that "it's a core component of what you need" and "he does not see the need". However, a former Facebook privacy manager had other feelings in the matter that he did not complain that the user information would be reviewed without explicit consent.

On the other side of this coin, a Facebook spokesman claims that the data policy "makes it clear …" we use the information that people provide to Facebook improve their experience, and we may work with service providers, to support this process. "In other words, you have signed up for Facebook at least.

All this means one thing: in that day and age, "private" never really means privately – I just means that you do not know who really sees it. I think you could make everything public and alleviate the problem altogether, heh. [Reuters via The Verge]

In other news, OnePlus made a questionable video about the sealing features of the 7, WWDC rumors, further development of Chrome OS virtual desktops, and more.

  • OnePlus threw the 7 in a bucket Then he said not to do that: OnePlus is a company that has made questionable marketing decisions in the past, and its recent video highlighting the sealing of the OnePlus 7 , is a good example. It shows that the phone was thrown into a bucket of water. In this text, at the bottom of the screen, it generally says, "Do not do that." The phone does not have IP certification, which apparently costs more money than the company wants to spend. All this leaves many questions about how waterproof the phone really is. [The Verge, TechRadar]
  • Numerous WWDC Rumors: Bloomberg reported a series of WWDC rumors this year, including iOS 13, MacOS 10.15, WatchOS 6, a new TVOS, and more. Usually you take everything with a grain of salt until it is actually confirmed. [Bloomberg]
  • Chrome OS Evolution for Virtual Desktops: Last week, we talked about virtual desktops in Chrome OS. Over the weekend, a few more videos have surfaced showing even more development. It looks so good. [Chrome Unboxed]
  • Google will rename Express to Google Shopping: We'll probably learn more about this at I / O, but it looks like Google is preparing to "quickly" expand and rename Google Express into Google Shopping , Neat. [9to5Google]
  • A hacker holds Git repositories ready for ransom: The hacker allegedly wipes them and threatens to release the code if victims do not pay the ransom within ten days. Impressive. [ZDNet]
  • Update Chrome for Android without visiting the Play Store: Google is testing a new update method in Chrome Canary for Android that allows users to update without first visiting the Play Store. [Techdows]
  • More than half of Bitcoin nodes execute vulnerable code: There are more than 100,000 Bitcoin nodes, and half of them execute vulnerable code. That is disturbing. [The Next Web]

Over the weekend, CNBC had an absolutely mesmerizing coverage of cybercriminals. It turns out that they often follow the same model as real companies, eg. In competition for customers, hiring project managers and even "CEOs" to keep everything organized and on track. Everything to steal data, money and identity of others. Unreal.


Source link