Como Is Infosec

Content moderation is a security problem.

Cryteria, CC BY 3.0 (modified)/Crosa, CC BY 2.0 (modified)

in·fo·sec (/ˈinfōˌsek/): information security

co·mo (/koh-moh/): content moderation

Content moderation is really, really hard.

Content moderators:

  • seek to set conversational norms, steering transgressors toward resources that help them better understand the local conversational rules;
  • respond to complaints from users about uncivil, illegal, deceptive or threatening posts;
  • flag or delete material that crosses some boundary (for example, deleting posts that dox other users, or flagging posts with content warning for adult material or other topics);
  • elevate or feature material that is exemplary of community values;
  • adjudicate disputes about impersonation, harassment and other misconduct.

This is by no means a complete list!

Continue reading "Como Is Infosec"

Pluralistic: 28 Jul 2022


Today's links

Continue reading "Pluralistic: 28 Jul 2022"

Pluralistic: 26 May 2022


Today's links

Continue reading "Pluralistic: 26 May 2022"

Pluralistic: 19 May 2022


Today's links

Continue reading "Pluralistic: 19 May 2022"

About those kill-switched Ukrainian tractors

What John Deere did to Russian looters, anyone can do to farmers, anywhere.

A vintage John Deere tractor whose wheel hubs have been replaced with HAL 9000 eyes, matted over a background of the cyber-waterfall image from The Matrix.
Cryteria/CC BY 3.0, modified

Here’s a delicious story: CNN reports that Russian looters, collaborating with the Russian military, stole 27 pieces of John Deere farm equipment from a dealership in Melitopol, Ukraine, collectively valued at $5,000,000. The equipment was shipped to Chechnya, but it will avail the thieves naught, because the John Deere dealership reached out over the internet and bricked these tractors, using an in-built kill-switch.

Since that story ran last week, I’ve lost track of the number of people who sent it to me. I can see why: it’s a perfect cyberpunk nugget: stolen tractors rendered inert by an over-the-air update, thwarting the bad guys. It could be the climax of a prescient novella in Asimov’s circa 1996.

But I’m here to tell you: this is not a feel-good story.

I mean, sure. In the short term, it’s really cool to think of those looters arriving in Chechnya only to discover that their looted tractors and combines and such are only good for spare parts (and maybe not even that).

But if you scratch the surface of that cinematic comeuppance, what you find is a far scarier parable about the way that cyberwarfare could extrude itself into the physical world. After all, if John Deere’s authorized technicians can reach out and brick any tractor or combine, anywhere in the world, then anyone who suborns, hacks or blackmails a John Deere technician — say, Russia’s storied hacker army, who specialize in mass-scale infrastructure attacks, which they perfected by attacking Ukrainian embedded systems — can do the exact same thing.

Continue reading "About those kill-switched Ukrainian tractors"

Pluralistic: 27 Apr 2022


Today's links

Continue reading "Pluralistic: 27 Apr 2022"

Pluralistic: 30 Mar 2022


Today's links

Continue reading "Pluralistic: 30 Mar 2022"

Pluralistic: 13 Nov 2021


Today's links

Continue reading "Pluralistic: 13 Nov 2021"

Pluralistic: 21 Oct 2021


Today's links

Continue reading "Pluralistic: 21 Oct 2021"

Pluralistic: 25 Aug 2021


Today's links

Continue reading "Pluralistic: 25 Aug 2021"