Email or username:

Password:

Forgot your password?
4 posts total
Sarah Jamie Lewis

Reading through Mozillas jobs page: "Senior Staff Machine Learning Engineer, Gen AI", "Senior Staff Software Engineer, Ads", "Program Manager, AI 360", "Principal Product Manager, Generative AI","Sr Staff Fullstack Engineer, Anonym", "Senior Manager, Sales (Anonym)"

I see they have fully pointed the ship towards a future of AI and Ads.

Show previous comments
Kristen

@sarahjamielewis and they - along with Google - can go fuck themselves. I deleted it from all devices.

Richard Johnson

@sarahjamielewis @marshray
Anonym's takeover of Mozilla is akin to Doubleclick's takeover of Google

Paul_IPv6

@sarahjamielewis

if @mozilla were hiring a Chief Privacy Officer instead, i'd feel a lot better...

if they hired someone with experience in getting community involvement and funding, instead of ad based funding, i'd be in heaven...

Sarah Jamie Lewis

"Note that Recall does not perform content moderation. It will not hide information such as passwords or financial account numbers."

The computer, however, will stop you from recording DRM'd content.

Find it fascinating that when faced with drawing safety and security boundaries, the primary beneficiary is not the owner of the device, or the person using it, but random corporations who control the intellectual property rights.

The system doesn't work for you.

Show previous comments
decapitae

@sarahjamielewis The system doesn't work unless you have rich monies. There's not many people in lower and middle 'class' that have that anymore.
The fragile ego'ed have maxed out the upper 'class' arena and made it clear they don't value anyone except for their use as a cash cow.

pinkdrunkenelephants

@sarahjamielewis We can and should push everyone to switch over to Linux.

Sarah Jamie Lewis

Thank you everyone who commented on my thread yesterday regarding decentralized search.

It became clear to me this morning that in order to have a useful discussion on the topic I needed to gather my notes into a more useful format. So I spent this morning writing them up.

Notes on Decentralized Search: sarahjamielewis.com/decentrali (pdf / draft)

This is very much a draft that captures where I am in my thinking regarding the problem - less so about the prototypes I've been tinkering with.

Thank you everyone who commented on my thread yesterday regarding decentralized search.

It became clear to me this morning that in order to have a useful discussion on the topic I needed to gather my notes into a more useful format. So I spent this morning writing them up.

Notes on Decentralized Search: sarahjamielewis.com/decentrali (pdf / draft)

Sarah Jamie Lewis

These are very high level notes, and it is worth noting that the document itself is subject to updates - I will likely augment it as the conversation progresses, and I am very open to collaboration and critiques on missing aspects.

Also, as noted above, I did not include any of my more concrete ideas for solutions to some of the challenges outlined (I'm putting something together for that too)

However, this now allows far more room to set out the context for a discussion than mastodon permits.

Rob Landley

@sarahjamielewis I am reminded of the old quote "I haven't got a solution but I certainly admire the problem".

I remember how searching gnutella was both crazy slow and unreliable, with two consecutive searches producing different results.

I remember when the coinbros started complaining that having the entire ledger locally was way too big and computationally expensive, but relying on servers to say who had what was untrustworthy...

Lots of existing work in this space. Few if any solutions.

Sarah Jamie Lewis

Really uncomfortable with (otherwise cool) organizations using the presence of cryptography to back up a security/privacy claim that is 100% policy based.

Just because they don't do a thing doesn't mean they can't do a thing.

"We don't know who you talk to" (because we don't log that information as it passes through our servers)

is a very different claim than...

"We don't know who you talk to" (because we physically and computationally will never have access to that information)

Show previous comments
jenkinse

@sarahjamielewis A tad confused by the first sentence here. I mean backing up a security/privacy claim with the presence of cryptography is a good thing right? But if its 100% policy based that would imply the absence of cryptography not the presence of cryptography?

Winfried

@sarahjamielewis doing privacy analysis for living, this is a daily dilemma for me. I rather see the data not processed at all, but some has to be processed for functionality. Ideally an organization acknowledges the sensitivity of the data with both legal (policy) and technological mitigations. And I often see encryption deployed in an ineffective way.

Go Up