|||

Scary:

One issue identified on an unnamed carrierʼs implementation could allow any app on your phone to download your RCS configuration file, for example, giving the app your username and password and allowing it to access all your voice calls and text messages. In another case, the six-digit code a carrier uses to verify a userʼs identity was vulnerable to being guessed through brute force by a third-party. These problems were found after researchers analyzed a sample of SIM cards from several different carriers.

RCS is supposed to be a big deal. It’s fascinating how these system-wide policies can be messed up in microsystem implementations.

Up Next Next → Combining semantic and term frequency similarities for text clustering Existing options for algorithmic evaluation of the similarity of documents are typically limited to only the vocabulary in the documents. This new approach leverages Google’s broader knowledge of language to connect terms in a given document to the vocabulary it’s normally used with. Very cool! ← Previous 2019 Tech Trends Report — The Future Today Institute The Future Today Institute’s 2019 Trends Report is worth a look.
Latest posts
▵  Elon Musk attempts to explain Twitter to normal people in court
▵  TED and YouTube launch global climate initiative
▵  Embracing multilingualism to enhance complexity sensitive research
▵  The ‘Amazon effect’ is flooding a struggling recycling system with cardboard
▵  John Kerry, Arnold Schwarzenegger wage ‘World War Zero’ on climate change
▵  Combining semantic and term frequency similarities for text clustering
▵  Bad RCS implementations are creating big vulnerabilities, security researchers claim
▵  2019 Tech Trends Report — The Future Today Institute
▵  Medical Crowdsourcing: Harnessing the “Wisdom of the Crowd” to Solve Medical Mysteries
▵  Report Launch - OPSI Primer on AI for the Public Sector
▵  “Level Up”: Leveraging Skill and Engagement to Maximize Player Gameplay
▵  Beautiful is Good and Good is Reputable: Multiple-Attribute Charity Website Evaluation and Initial Perceptions of Reputation Under the Halo Effect
▵  Piret Tõnurist & Systems Change: how to get started and keep going?
▵  IBM expert Tamreem El Tohamy on bridging the skills gap in Africa
▵  The changing work of innovation for public value and social impact
▵  Former Go champion beaten by DeepMind retires after declaring AI invincible
▵  What part of “viral” content makes platforms want to encourage its spread?
▵  MTA floods NYC subway entrance because ‘climate change is real’
▵  The Demon Haunted World
▵  How to recognize AI snake oil
▵  A Systemic View of Research Impact
▵  Nobel Economics Prize Goes to Pioneers in Reducing Poverty
A brief, informal guide to doing grounded theory
▵  Adam Savage on Lists, More Lists, and the Power of Checkboxes
▵  Systems Practice, Abridged
▵  Fukushima reinvents itself with a $2.7 billion bet on renewables
▵  How Tesla’s first Gigafactory is changing Reno, Nevada
▵  “This is Sticking with Them:” Professor Explores Benefits of Model-Based Learning
Keeping the buzz in buzzwords
▵  README.txt: Introducing Into the Dataverse, the article series
▵  A ton of people received text messages overnight that were originally sent on Valentine’s Day