The US military wants to understand the most important software on Earth (MIT Technology Review)
The ultimate goal is to detect and counteract any malicious campaigns to submit flawed code, launch influence operations, sabotage development, or even take control of open-source projects. To do this, the researchers will use tools such as sentiment analysis to analyze the social interactions within open-source communities such as the Linux kernel mailing list, which should help identify who is being positive or constructive and who is being negative and destructive.
Posted Jul 14, 2022 18:00 UTC (Thu)
by NightMonkey (subscriber, #23051)
[Link] (1 responses)
Of course, they probably won't address one of the biggest threats to 'open source code', namely, large corporations and governments who add "negative and destructive" friction onto individuals who are participating, or would like to participate, in Open Source development and communities. Can forcing engineers to run a locked-down Windows environment for 8-10 hours a day be seen as such a threat? ;) Call the Pentagon! :D
Posted Jul 17, 2022 5:41 UTC (Sun)
by NYKevin (subscriber, #129325)
[Link]
Source: https://www.nytimes.com/2019/10/24/us/nuclear-weapons-flo...
Posted Jul 14, 2022 18:18 UTC (Thu)
by aklaver (guest, #62352)
[Link]
Posted Jul 14, 2022 18:28 UTC (Thu)
by NightMonkey (subscriber, #23051)
[Link] (7 responses)
This subject kills me, too. So, at a certain level, all code is a math expression (where it is either compiled or interpreted down to machine code). So, if an Iranian or North Korean, Russian soldier or Ukranian Azov Battalion member, or Israeli or Palestinian, or a clerk in the Pentagon says "1+1=2", does that change the truth of it? Other parts of the article basically hint at a worldview that colors the very openness of the development process as a threat.
Many people, myself included, appreciate the openness of F/OSS because the code doesn't care about your flag, your location, your mode of living, your love or hatred of arugula, or the color of your skin, or your place on the gender spectrum. Or even if you are a dog. :D (https://en.wikipedia.org/wiki/On_the_Internet%2C_nobody_k...'re_a_dog)
Posted Jul 14, 2022 23:38 UTC (Thu)
by gerdesj (subscriber, #5446)
[Link] (3 responses)
When you see that sort of nonsense coming out of a well respected org such as MIT as a puff piece then you know that you had better avoid being "undesirable" and start being a better person. This bloke: https://www.technologyreview.com/author/patrick-howell-on... is one role model for you who can trot out this sort of drivell without whincing.
I understand that one must dumb down somewhat when communicating with the hoi polloi and other generally unwashed types but this is an article that clearly explains to children that we can't trust open source code because we can read it at any time. You can't blindly go around trusting something you can delve into and review yourself. You should allow adults to do that for you.
I'm acutely aware of many of the flaws that turn up in FLOSS - I follow dozens of bugzillas etc and mailing lists that exhaustively discuss how to deliver next month's bugs effectively and on schedule. I have some insights into the sheer effort that say jra goes to to screw up my Samba experience or some of you lot do with delivering Linux and that corbet bloke and his dodgy website.
I also get to tread the Patch Wednesday (yes weds not tues - "let he who is without fear ...") treadmill with absolutely no idea what is going on but I do it anyway: yay - CVEs with serious sounding flaws and some jolly exciting write ups but I can't look at the code - its a bloody cargo cult thing. Getting to the bottom of some of the weirder corners of Windows is quite a challenge - for example: AdminSdHolder - who knew, until you knew! What a load of cobblers.
https://techcommunity.microsoft.com/t5/ask-the-directory-... - Why would you? That's wankery in action - We've bodged a solution/papered over some cracks and expect you to do some weird shit. Soz/lol, that's the thing you engage when you do things like create a service account that can only change passwords without being a domain admin. You fiddle with perms on a LDAP container object to give rights to a user type object and ADUC can't do that sort of thing (lol).
Anyway, I doubt that the US military hasn't noticed where their software is coming from nor how it is written.
Posted Jul 15, 2022 12:37 UTC (Fri)
by eduperez (guest, #11232)
[Link]
I think they are more worried about who wrote the code than who can read it:
> "The ultimate goal is to detect and counteract any malicious campaigns to submit flawed code, launch influence operations, sabotage development, or even take control of open-source projects."
Posted Jul 15, 2022 19:55 UTC (Fri)
by vulpicastor (subscriber, #122452)
[Link] (1 responses)
Posted Jul 18, 2022 6:33 UTC (Mon)
by ceplm (subscriber, #41334)
[Link]
Posted Jul 15, 2022 13:08 UTC (Fri)
by IanKelling (subscriber, #89418)
[Link] (2 responses)
Posted Jul 15, 2022 15:21 UTC (Fri)
by NightMonkey (subscriber, #23051)
[Link] (1 responses)
I think you should probably read the article before replying, though. :)
Posted Jul 17, 2022 19:35 UTC (Sun)
by IanKelling (subscriber, #89418)
[Link]
Posted Jul 14, 2022 18:33 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link] (2 responses)
Posted Jul 14, 2022 18:38 UTC (Thu)
by amacater (subscriber, #790)
[Link] (1 responses)
Posted Jul 14, 2022 20:07 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link]
Posted Jul 14, 2022 18:40 UTC (Thu)
by pebolle (guest, #35204)
[Link] (8 responses)
Likewise, from today's Security quote of the week:
Both quotes immediately triggered my "Snake oil" alarm.
(I do hope my alarm is calibrated correctly, because I find the approaches advocated in those quotes creepy beyond belief.)
Posted Jul 14, 2022 22:38 UTC (Thu)
by Wol (subscriber, #4433)
[Link]
> > Detecting hate speech is a good proxy for terrorist radicalisation. In 2018, we thought we could detect hate speech with a precision of typically 92%, which would mean a false-alarm rate of 8%.
The follow-on to that is good, though ...
In 2022, now we understand the problem better, our ability to detect hate speech has gone DOWN...
Cheers,
Posted Jul 15, 2022 9:55 UTC (Fri)
by dottedmag (subscriber, #18590)
[Link] (5 responses)
A napkin math: if you have 1M participants, 100 participants are terrorists, and the test has 0% false negatives, then this test would drag in 100 real terrorists and 79992 falsely accused ones.
Posted Jul 15, 2022 11:05 UTC (Fri)
by taladar (subscriber, #68407)
[Link] (3 responses)
Posted Jul 15, 2022 21:10 UTC (Fri)
by Wol (subscriber, #4433)
[Link] (1 responses)
Well actually, if your false positive is high, then your false negative is likely to be low ... if your false positive is that high, you'll probably get 99 out of 100 real terrorists.
I can't remember the exact terminology, but tests either tend to be very good at picking up the target, OR very good at not picking up non-targets. Of course, Sod makes it very hard to run both tests over the same dataset :-)
(We had that with CoVid - tests were either very sensitive and picked up every genuine case along with a lot of false positives, or very specific and didn't pick up false negatives but let genuine cases slip through.)
Cheers,
Posted Jul 20, 2022 6:06 UTC (Wed)
by riking (guest, #95706)
[Link]
Posted Jul 16, 2022 13:45 UTC (Sat)
by farnz (subscriber, #17727)
[Link]
Depends on the details of the test. We have a 2x2 confusion matrix of test result versus real result, and the false positive rate tells us how many samples fall in one of the 4 cells of the matrix - in this case, how many are in the "test says yes" column and the "real world says no" row. This gives us a decent chance of guessing at the behaviour of the system when the "test says yes", and when the "real world says no", but we need more data to be able to say something about the behaviour of the system when the "test says no" or when the "real world says yes".
In particular, it's common to have a low false negative rate with a high false positive rate, or vice-versa, since the underlying judgement is likely to be a confidence level and a threshold; if you set the threshold low, you have very low false negative rates, but very high false positive rates, while if you set the threshold high, you get very high false negative rates, but very low false positive rates.
Posted Jul 15, 2022 16:20 UTC (Fri)
by NYKevin (subscriber, #129325)
[Link]
Posted Jul 15, 2022 22:53 UTC (Fri)
by gerdesj (subscriber, #5446)
[Link]
Not half. The term "sentiment analysis" is causing my left eye to twitch and a vein to throb. I may go postal soon 8)
Posted Jul 14, 2022 19:58 UTC (Thu)
by amarao (guest, #87073)
[Link] (11 responses)
Posted Jul 15, 2022 4:16 UTC (Fri)
by nksingh (subscriber, #94354)
[Link]
Posted Jul 15, 2022 9:41 UTC (Fri)
by adobriyan (subscriber, #30858)
[Link] (4 responses)
Posted Jul 17, 2022 5:46 UTC (Sun)
by NYKevin (subscriber, #129325)
[Link] (3 responses)
Posted Jul 17, 2022 13:05 UTC (Sun)
by mathstuf (subscriber, #69389)
[Link]
Posted Jul 17, 2022 22:15 UTC (Sun)
by rschroev (subscriber, #4164)
[Link] (1 responses)
Posted Jul 18, 2022 1:53 UTC (Mon)
by mathstuf (subscriber, #69389)
[Link]
Posted Jul 15, 2022 10:17 UTC (Fri)
by Thomas (subscriber, #39963)
[Link] (4 responses)
You name it, clearly hate speech and terrorists everywhere. There is a lot of intel for the military to gain.
Posted Jul 15, 2022 12:46 UTC (Fri)
by amarao (guest, #87073)
[Link] (2 responses)
Posted Jul 15, 2022 13:35 UTC (Fri)
by Narusegawa (guest, #159714)
[Link] (1 responses)
Posted Jul 24, 2022 6:57 UTC (Sun)
by CChittleborough (subscriber, #60775)
[Link]
Posted Jul 15, 2022 13:24 UTC (Fri)
by Thomas (subscriber, #39963)
[Link]
Dark mode - Light mode
and not Bright mode, but you got the point.
Posted Jul 14, 2022 20:57 UTC (Thu)
by flussence (guest, #85566)
[Link]
Posted Jul 15, 2022 3:40 UTC (Fri)
by pabs (subscriber, #43278)
[Link]
Posted Jul 15, 2022 12:26 UTC (Fri)
by clugstj (subscriber, #4020)
[Link] (2 responses)
Posted Jul 15, 2022 15:34 UTC (Fri)
by NightMonkey (subscriber, #23051)
[Link] (1 responses)
What is surprising is how propagandized the US and its allies are, in that we can accept DoubleSpeak almost everywhere.
DARPA is the source of many important technological innovations, no doubt. As a taxpayer, I'd prefer that we just fund the research, and the funds not have to go through the military.
And I like it when the press shows a dedication to clarity and accuracy, which is very rare today. And this is one reason I support LWN.
Posted Jul 15, 2022 17:07 UTC (Fri)
by Wol (subscriber, #4433)
[Link]
That's American Imperialism at work :-)
They fund lots of "military research", which has to go to American firms, and then scream blue murder when their companies are not allowed to bid for or buy up European research projects ...
Cheers,
Posted Jul 15, 2022 13:34 UTC (Fri)
by somlo (subscriber, #92421)
[Link] (1 responses)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
When you see that sort of nonsense coming out of a well respected org such as MIT as a puff piece
The MIT Technology Review is editorially independent from other parts of MIT, so it’s inaccurate to lump it together with, say, the school’s PR department, which works for the leadership. In any case, for any sufficiently large organization, the left hand probably doesn’t know what the right hand is doing.
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
> Detecting hate speech is a good proxy for terrorist radicalisation. In 2018, we thought we could detect hate speech with a precision of typically 92%, which would mean a false-alarm rate of 8%.
The US military wants to understand the most important software on Earth (MITTechnology Review)
Wol
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
Wol
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
vim - emacs
CLI - GUI
sysvinit - systemd
case-sensitive FS - case-insensitive FS
Dark mode - bright mode
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
That civil war occurs in a satirical novel by the guy who wrote “A Modest Proposal”, an (in?)famous satire. I’m sure that amarao’s comment is also satire.
Literary reference
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
Wol
I've been thinking about that for a while now. It's an interesting (and, if you think about it, important) question. Just not sure there's a good way to go about it ethically. Ethically measuring a Free/Open project's ability to withstand malicious "contributions"
Posted Jul 17, 2022 2:34 UTC (Sun)
by marcH (subscriber, #57642)
[Link]
Well it's much easier if your final goal is to actually add vulnerabilities, not publish a research paper on how it can be done. People who did the former simply did not talk about it and the vulnerabilities they added are still there. If they get caught at some later point they'll just say "oops! Sorry"; C makes deniability very easy.
I've seen a lot of comments like this one about the experiment = blaming the messenger. Even when correct, neither interesting nor relevant. I haven't read much about actual security gaps in the kernel processes. I hope I missed that.
Posted Jul 17, 2022 7:57 UTC (Sun)
by ssmith32 (subscriber, #72404)
[Link] (1 responses)
No, it's turtles, all the way down. Clearly.
Posted Jul 17, 2022 12:47 UTC (Sun)
by Wol (subscriber, #4433)
[Link]
Cheers,
Ethically measuring a Free/Open project's ability to withstand malicious "contributions"
The US military wants to understand the most important software on Earth (MITTechnology Review)
The US military wants to understand the most important software on Earth (MITTechnology Review)
Wol