[syndicated profile] bruce_schneier_feed

Posted by Bruce Schneier

I have no context for this video—it’s from Reddit—but one of the commenters adds some context:

Hey everyone, squid biologist here! Wanted to add some stuff you might find interesting.

With so many people carrying around cameras, we’re getting more videos of giant squid at the surface than in previous decades. We’re also starting to notice a pattern, that around this time of year (peaking in January) we see a bunch of giant squid around Japan. We don’t know why this is happening. Maybe they gather around there to mate or something? who knows! but since so many people have cameras, those one-off monster-story encounters are now caught on video, like this one (which, btw, rips. This squid looks so healthy, it’s awesome).

When we see big (giant or colossal) healthy squid like this, it’s often because a fisher caught something else (either another squid or sometimes an antarctic toothfish). The squid is attracted to whatever was caught and they hop on the hook and go along for the ride when the target species is reeled in. There are a few colossal squid sightings similar to this from the southern ocean (but fewer people are down there, so fewer cameras, fewer videos). On the original instagram video, a bunch of people are like “Put it back! Release him!” etc, but he’s just enjoying dinner (obviously as the squid swims away at the end).

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Blog moderation policy.

Nothing much to see

Dec. 12th, 2025 05:48 pm
tig_b: cartoon from nMC set (Default)
[personal profile] tig_b
 Instead of editing or finishing a book, I've been busy catching up on missed deadlines after an Oct mainly spent feeling ill.

So I wrote and delivered a training course and am partway through 4 more.
Plus too many school appeals.
In the middle were other bits and pieces connected to various voluntary posts.
And a little paid work in refill the financial hole left by vet bills and teeth.

Building Trustworthy AI Agents

Dec. 12th, 2025 12:00 pm
[syndicated profile] bruce_schneier_feed

Posted by Bruce Schneier

The promise of personal AI assistants rests on a dangerous assumption: that we can trust systems we haven’t made trustworthy. We can’t. And today’s versions are failing us in predictable ways: pushing us to do things against our own best interests, gaslighting us with doubt about things we are or that we know, and being unable to distinguish between who we are and who we have been. They struggle with incomplete, inaccurate, and partial context: with no standard way to move toward accuracy, no mechanism to correct sources of error, and no accountability when wrong information leads to bad decisions.

These aren’t edge cases. They’re the result of building AI systems without basic integrity controls. We’re in the third leg of data security—the old CIA triad. We’re good at availability and working on confidentiality, but we’ve never properly solved integrity. Now AI personalization has exposed the gap by accelerating the harms.

The scope of the problem is large. A good AI assistant will need to be trained on everything we do and will need access to our most intimate personal interactions. This means an intimacy greater than your relationship with your email provider, your social media account, your cloud storage, or your phone. It requires an AI system that is both discreet and trustworthy when provided with that data. The system needs to be accurate and complete, but it also needs to be able to keep data private: to selectively disclose pieces of it when required, and to keep it secret otherwise. No current AI system is even close to meeting this.

To further development along these lines, I and others have proposed separating users’ personal data stores from the AI systems that will use them. It makes sense; the engineering expertise that designs and develops AI systems is completely orthogonal to the security expertise that ensures the confidentiality and integrity of data. And by separating them, advances in security can proceed independently from advances in AI.

What would this sort of personal data store look like? Confidentiality without integrity gives you access to wrong data. Availability without integrity gives you reliable access to corrupted data. Integrity enables the other two to be meaningful. Here are six requirements. They emerge from treating integrity as the organizing principle of security to make AI trustworthy.

First, it would be broadly accessible as a data repository. We each want this data to include personal data about ourselves, as well as transaction data from our interactions. It would include data we create when interacting with others—emails, texts, social media posts—and revealed preference data as inferred by other systems. Some of it would be raw data, and some of it would be processed data: revealed preferences, conclusions inferred by other systems, maybe even raw weights in a personal LLM.

Second, it would be broadly accessible as a source of data. This data would need to be made accessible to different LLM systems. This can’t be tied to a single AI model. Our AI future will include many different models—some of them chosen by us for particular tasks, and some thrust upon us by others. We would want the ability for any of those models to use our data.

Third, it would need to be able to prove the accuracy of data. Imagine one of these systems being used to negotiate a bank loan, or participate in a first-round job interview with an AI recruiter. In these instances, the other party will want both relevant data and some sort of proof that the data are complete and accurate.

Fourth, it would be under the user’s fine-grained control and audit. This is a deeply detailed personal dossier, and the user would need to have the final say in who could access it, what portions they could access, and under what circumstances. Users would need to be able to grant and revoke this access quickly and easily, and be able to go back in time and see who has accessed it.

Fifth, it would be secure. The attacks against this system are numerous. There are the obvious read attacks, where an adversary attempts to learn a person’s data. And there are also write attacks, where adversaries add to or change a user’s data. Defending against both is critical; this all implies a complex and robust authentication system.

Sixth, and finally, it must be easy to use. If we’re envisioning digital personal assistants for everybody, it can’t require specialized security training to use properly.

I’m not the first to suggest something like this. Researchers have proposed a “Human Context Protocol” (https://papers.ssrn.com/sol3/ papers.cfm?abstract_id=5403981) that would serve as a neutral interface for personal data of this type. And in my capacity at a company called Inrupt, Inc., I have been working on an extension of Tim Berners-Lee’s Solid protocol for distributed data ownership.

The engineering expertise to build AI systems is orthogonal to the security expertise needed to protect personal data. AI companies optimize for model performance, but data security requires cryptographic verification, access control, and auditable systems. Separating the two makes sense; you can’t ignore one or the other.

Fortunately, decoupling personal data stores from AI systems means security can advance independently from performance (https:// ieeexplore.ieee.org/document/ 10352412). When you own and control your data store with high integrity, AI can’t easily manipulate you because you see what data it’s using and can correct it. It can’t easily gaslight you because you control the authoritative record of your context. And you determine which historical data are relevant or obsolete. Making this all work is a challenge, but it’s the only way we can have trustworthy AI assistants.

This essay was originally published in IEEE Security & Privacy.

Update [me, health, Patreon]

Dec. 12th, 2025 06:49 am
siderea: (Default)
[personal profile] siderea
So, I, uh, got my RSI/ergonomics debugged!* I then promptly lost two days to bad sleep due to another new mechanical failure of the balky meat mecha and also a medical appointment in re two previous malfunctions. But I seem back in business now. The new keyboard is great.

Patrons, I've got three Siderea Posts out so far this month and it's only the 12th. I have two more Posts I am hoping to get out in the next three days. Also about health insurance. We'll see if it actually happens, but it's not impossible. I have written a lot of words. (I really like my new keyboard.)

Anyways, if you weren't planning on sponsoring five posts (or – who knows? – even more) this month, adjust your pledge limits accordingly.

* It was my bra strap. It was doing something funky to how my shoulder blade moved or something. It is both surprising to me that so little pressure made so much ergonomic difference, and not surprising because previously an even lighter pressure on my kneecap from wearing long underwear made my knee malfunction spectacularly. Apparently this is how my body mechanics just are.
siderea: (Default)
[personal profile] siderea
Canonical link: https://siderea.dreamwidth.org/1890494.html


0.

Hey Americans (and other people stuck in the American healthcare system)! Shopping for a health plan on your state marketplace? Boy, do I have some information for you that you should have and probably don't. There's been an important legal change affecting your choices that has gotten almost no press.

Effective with plan year 2026 all bronze level and catastrophic plans are statutorily now HDHPs and thus HSA compatible. You may get and self-fund an HSA if you have any bronze or catastrophic plan, as well as any plan of any level designated a HDHP.

2025 Dec 9: IRS.gov: "Treasury, IRS provide guidance on new tax benefits for health savings account participants under the One, Big, Beautiful Bill"
Bronze and Catastrophic Plans Treated as HDHPs: As of Jan. 1, 2026, bronze and catastrophic plans available through an Exchange are considered HSA-compatible, regardless of whether the plans satisfy the general definition of an HDHP. This expands the ability of people enrolled in these plans to contribute to HSAs, which they generally have not been able to do in the past. Notice 2026-05 clarifies that bronze and catastrophic plans do not have to be purchased through an Exchange to qualify for the new relief.

If you are shopping plans right now (or thought you were done), you should probably be aware of this. Especially if you are planning on getting a bronze plan, a catastrophic plan, or any plan with the acronym "HSA" in the name or otherwise designated "HSA compatible".

The Trump administration doing this is tacit admission that all bronze plans have become such bad deals that they're the economic equivalent of what used to be considered a HDHP back when that concept was invented, and so should come with legal permission to protect yourself from them with an HSA.

Effective immediately, you should consider a bronze plan half an insurance plan.

Read more [3,340 words] )

This post brought to you by the 221 readers who funded my writing it – thank you all so much! You can see who they are at my Patreon page. If you're not one of them, and would be willing to chip in so I can write more things like this, please do so there.

Please leave comments on the Comment Catcher comment, instead of the main body of the post – unless you are commenting to get a copy of the post sent to you in email through the notification system, then go ahead and comment on it directly. Thanks!

more on visual culture in science

Dec. 12th, 2025 11:04 am
kaberett: Trans symbol with Swiss Army knife tools at other positions around the central circle. (Default)
[personal profile] kaberett

This morning I am watching the lecture I linked to on Tuesday!

At 6:53:

Here is an example of how the Hubble telescope image of the Omega nebula, or Messier 17, was created, by adding colours -- which seem to have been chosen quite arbitrarily -- and adjusting composition.

The slide is figure 13 (on page 10) from an Introduction to Image Processing (PDF) on the ESA Hubble website; I'm baffled at the idea that the colours were chosen "arbitrarily" given that the same PDF contains (starting on page 8) §1.4 Assigning colours to different filter exposures. It's not a super clear explanation -- I think the WonderDome explainer is distinctly more readable -- but the explanation does exist and is there.

Obviously I immediately had to stop and look all of this up.

(Rest of the talk was interesting! But that point in particular about modern illustration as I say made me go HOLD ON A SEC--)

[syndicated profile] openrightsgroup_feed

Posted by Pam Cowburn

  • ORG joins Age Verification Providers Association in calling for higher standards for age assurance and more clarity about when it should be used.
  • Online Safety Act is forcing public to use unregulated age assurance services.
  • MPs are due to discuss Online Safety Act on Mon Dec 15 after more than 550,000 people petitioned Parliament to repeal the law.

Open Rights Group has written to the Secretary of State for Science, Innovation and Technology, Liz Kendall MP calling for regulation of age assurance providers operating under the Online Safety Act. The letter has also been signed by Age Verification Providers Association (AVPA) and over 600 members of the public.

Regulate age verification

Since July, many online platforms have forced their users to verify their age as part of their obligations under the Online Safety Act. These are not just pornography websites but also dating apps, social media platforms such as BlueSky and Reddit, streaming services such as Spotify, and Xbox gaming services.

It is platforms, not users, that decide which age verification providers are use. They have an incentive to choose cheaper and less secure vendors, mainly located in the US, with varying quality of data protection practices. Some less reputable providers may also choose to collect more data than necessary in order to profit from it.

ORG is asking the Government, ICO, and Ofcom to establish compulsory privacy and security standards for these providers to ensure that users’ sensitive data is protected.

James Baker, Platform Power Programme Manager at ORG, said:

“As a result of the Online Safety Act adults in the UK are being asked to share sensitive data to access social media sites, dating apps, and online gaming.

“Platforms choose which provider to use, and the public has to hope they can be trusted. Regulation would at least give some reassurance that our data is in safe hands.”

The call for regulation is supported by the Age Verification Providers Association (AVPA). Iain Corby, their Executive Director said:

“We’ve implemented self-regulation – a code of conduct, international standards, audit and certification – but agree more should be done officially too.”

In October, 70,000 IDs of Discord users were leaked, demonstrating the potential risks from age assurance.1 All processes around age assurance need to be secure, including any customer service support put in place to deal with people who experience problems when trying to verify their age.

Regulate the age assurance industry

Read the letter

On Monday December 15, MPs will debate the Online Safety Act after 550,000 people signed a petition calling for it to be repealed. ORG has outlined a number of ways that the Act can be improved in a new briefing.

Online Safety Act briefing for parliament

Read the briefing
[syndicated profile] tim_harford_feed

Posted by Tim Harford

A megaplant near the small village of Flixborough, England, is busy churning out a key ingredient of nylon 6, a material used in everything from stockings to toothbrushes to electronics. When a reactor vessel fails, the engineers improvise a quick-fix workaround, so the plant can keep up with demand. Before long, the temporary patch – a small, bent pipe – becomes a permanent part of the factory, and the people of Flixborough unknowingly drift towards disaster. 

For bonus episodes, ad-free listening, our monthly newsletter and behind-the-scenes conversations with members of the Cautionary Tales production team, consider joining the Cautionary Club.

[Apple] [Spotify] [Stitcher]

Further reading

The Flixborough disaster. Report of the Court of Inquiry

Flixborough 1974 Memories. Essential eye-witness history from the North Lincolnshire Museum. 

‘Fire and devastation’: 50 years on from the Flixborough disaster what’s changed? Chemistry World

[surgery] one year on!

Dec. 11th, 2025 10:28 pm
kaberett: Trans symbol with Swiss Army knife tools at other positions around the central circle. (Default)
[personal profile] kaberett

I continue extremely grateful to no longer have ureteric stents.

a bit of stock-taking )

Profile

pseudomonas: per bend sinister azure and or a chameleon counterchanged (Default)
pseudomonas

November 2024

S M T W T F S
     12
34567 89
10111213141516
17181920212223
24252627282930

Most Popular Tags

Expand Cut Tags

No cut tags
Page generated Dec. 13th, 2025 07:45 am
Powered by Dreamwidth Studios

Style Credit