diff --git a/CNAME b/CNAME new file mode 100644 index 000000000000..5d4b91d10df9 --- /dev/null +++ b/CNAME @@ -0,0 +1 @@ +tannermarino.com \ No newline at end of file diff --git a/_config.yml b/_config.yml index f9a962363918..89625a157ef7 100644 --- a/_config.yml +++ b/_config.yml @@ -12,15 +12,15 @@ # theme : "minimal-mistakes-jekyll" # remote_theme : "mmistakes/minimal-mistakes" -minimal_mistakes_skin : "default" # "air", "aqua", "contrast", "dark", "dirt", "neon", "mint", "plum", "sunrise" +minimal_mistakes_skin : "dark" # "air", "aqua", "contrast", "dark", "dirt", "neon", "mint", "plum", "sunrise" # Site Settings locale : "en-US" -title : "Site Title" +title : "Tanner Marino" title_separator : "-" subtitle : # site tagline that appears below site title in masthead -name : "Your Name" -description : "An amazing website." +name : "Tanner Marino" +description : "The life of Tanner Marino" url : # the base hostname & protocol for your site e.g. "https://mmistakes.github.io" baseurl : # the subpath of your site, e.g. "/blog" repository : # GitHub username/repo-name e.g. "mmistakes/minimal-mistakes" @@ -99,7 +99,7 @@ social: # Analytics analytics: - provider : false # false (default), "google", "google-universal", "custom" + provider : custom # false (default), "google", "google-universal", "custom" google: tracking_id : anonymize_ip : # true, false (default) @@ -107,18 +107,21 @@ analytics: # Site Author author: - name : "Your Name" - avatar : # path of avatar image, e.g. "/assets/images/bio-photo.jpg" - bio : "I am an **amazing** person." - location : "Somewhere" - email : + name : "Tanner Marino" + avatar : "/assets/images/profile.jpeg" + bio : "Problem solver." + location : "California" + email : # links: - label: "Email" icon: "fas fa-fw fa-envelope-square" - # url: mailto:your.name@email.com + url: "mailto:hey@tannermarino.com" - label: "Website" icon: "fas fa-fw fa-link" # url: "https://your-website.com" + - label: "LinkedIn" + icon: "fab fa-fw fa-linkedin" + url: "https://linkedin.com/in/tannermarino" - label: "Twitter" icon: "fab fa-fw fa-twitter-square" # url: "https://twitter.com/" @@ -127,7 +130,7 @@ author: # url: "https://facebook.com/" - label: "GitHub" icon: "fab fa-fw fa-github" - # url: "https://github.com/" + url: "https://github.com/tannn" - label: "Instagram" icon: "fab fa-fw fa-instagram" # url: "https://instagram.com/" @@ -219,10 +222,10 @@ sass: # Outputting -permalink: /:categories/:title/ +permalink: /:year/:title/ paginate: 5 # amount of posts to show paginate_path: /page:num/ -timezone: # https://en.wikipedia.org/wiki/List_of_tz_database_time_zones +timezone: America/Chicago # Plugins (previously gems:) @@ -278,6 +281,8 @@ compress_html: ignore: envs: development + + # Defaults defaults: @@ -290,5 +295,13 @@ defaults: author_profile: true read_time: true comments: # true - share: true + share: false related: true + # _pages + - scope: + path: "" + type: pages + values: + layout: single + author_profile: true + diff --git a/_data/navigation.yml b/_data/navigation.yml index 6f30866f3bed..5bb4d4bc0fc5 100644 --- a/_data/navigation.yml +++ b/_data/navigation.yml @@ -1,12 +1,12 @@ # main links main: - - title: "Quick-Start Guide" - url: https://mmistakes.github.io/minimal-mistakes/docs/quick-start-guide/ - # - title: "About" - # url: https://mmistakes.github.io/minimal-mistakes/about/ +# - title: "Quick-Start Guide" +# url: https://mmistakes.github.io/minimal-mistakes/docs/quick-start-guide/ + - title: "About" + url: /about/ # - title: "Sample Posts" # url: /year-archive/ # - title: "Sample Collections" # url: /collection-archive/ # - title: "Sitemap" - # url: /sitemap/ \ No newline at end of file + # url: /sitemap/ diff --git a/_includes/analytics-providers/custom.html b/_includes/analytics-providers/custom.html index c34b97ad90d9..51361a655fc5 100644 --- a/_includes/analytics-providers/custom.html +++ b/_includes/analytics-providers/custom.html @@ -1,3 +1,3 @@ - + \ No newline at end of file diff --git a/_includes/archive-single.html b/_includes/archive-single.html index 489f00067a6d..1660600f3fd3 100644 --- a/_includes/archive-single.html +++ b/_includes/archive-single.html @@ -31,7 +31,7 @@
{{ post.excerpt | markdownify | strip_html | truncate: 160 }}
{% endif %} diff --git a/_pages/404.md b/_pages/404.md new file mode 100644 index 000000000000..39388bb2847f --- /dev/null +++ b/_pages/404.md @@ -0,0 +1,6 @@ +--- +title: That's a 404 +permalink: /404.html +--- + +## You were just exploring, right? Refer to the navbar to get back on track. diff --git a/_pages/about.md b/_pages/about.md new file mode 100644 index 000000000000..5b953313d206 --- /dev/null +++ b/_pages/about.md @@ -0,0 +1,10 @@ +--- +permalink: /about/ +title: About +--- + +## Hey there. + +I'm Tanner. I'm a Software Engineer at PlayStation, working in San Diego. I enjoy learning new skills to solve technical challenges. Previously I worked as a Software Engineer at Union Pacific. I've also been the Assistant Director for [IfThen](https://www.ifthentech.com/) and co-organizer for [EBCT 2019](https://ebct2019.com/) Conference. + +I graduated from the University of Nebraska-Lincoln in May 2019 with a Bachelor of Science in Computer Science. While studying, I was the Founding Director for [CornHacks](https://cornhacks.com/) and the President of the [CSE Advisory Board](https://unl-csesab.com/). diff --git a/docs/_pages/category-archive.md b/_pages/category-archive.md similarity index 100% rename from docs/_pages/category-archive.md rename to _pages/category-archive.md diff --git a/docs/_pages/tag-archive.md b/_pages/tag-archive.md similarity index 100% rename from docs/_pages/tag-archive.md rename to _pages/tag-archive.md diff --git a/_posts/2018-12-10-Weaponizing-Technology-Microsoft-Leads-Silicon-Valley-Down-Grim-Path.md b/_posts/2018-12-10-Weaponizing-Technology-Microsoft-Leads-Silicon-Valley-Down-Grim-Path.md new file mode 100644 index 000000000000..eae481cab76e --- /dev/null +++ b/_posts/2018-12-10-Weaponizing-Technology-Microsoft-Leads-Silicon-Valley-Down-Grim-Path.md @@ -0,0 +1,13 @@ +--- +title: "Weaponizing Technology: Microsoft Leads Silicon Valley Down a Grim Path" +categories: [programming oversights, weaponizing technology, labor] +tags: [war, Microsoft, augmented reality, AI] +--- + +Joshua Brustein, in his [article](https://www.bloomberg.com/news/articles/2018-11-28/microsoft-wins-480-million-army-battlefield-contract) “Microsoft Wins $480 Million Army Battlefield Contract,” discusses the technology Microsoft will be supplying to the United States Army. The contract includes 100,000 HoloLens augmented reality headsets to “increase lethality by enhancing the ability to detect, decide and engage before the enemy.” This development is particularly troubling for what it could mean for the future of Silicon Valley. This step not only illustrates Microsoft leading the technology sector into the military-industrial complex, but also Microsoft’s disregard for employee’s choice in the work they do. Brustein writes about “earlier this year, hundreds of Microsoft workers signed a petition criticizing a contract with U.S. Immigration and Customs Enforcement.” Despite worker objections, Microsoft is [continuing](https://www.nytimes.com/2018/04/04/technology/google-letter-ceo-pentagon-project.html) to work with the government. Technology workers have demonstrated they do not want to build products used for waging war. Earlier this year, about 4,000 Google employees signed a petition demanding “a clear policy stating that neither Google nor its contractors will ever build warfare technology”. + +The technology industry is responsible for creating many of the tools we use today. Yet, these workers are against creating tools of mass destruction. The line drawn here is simple: these engineers, scientists, and designers want to build a better world. They have built instant messaging, wireless video calling, and portable, high quality cameras that can withstand daily uses and drops. Developing technologies designed to do harm is more than they signed up for. While discussing the ethical considerations of war is beyond the scope of this article, employees deserve to have a say in what they are building. + +The other issue at hand with this development is what it could lead to. In Burstein’s article, Microsoft’s President and Chief Legal Officer, Brad Smith, said "Artificial intelligence, augmented reality and other technologies are raising new and profoundly important issues, including the ability of weapons to act autonomously. As we have discussed these issues with governments, we’ve appreciated that no military in the world wants to wake up to discover that machines have started a war. But we can’t expect these new developments to be addressed wisely if the people in the tech sector who know the most about technology withdraw from the conversation.” Unfortunately, Smith’s last sentence is incorrect. It is possible to have a conversation about how society wants to use these advanced technologies without creating them first. Essentially, it appears Smith is saying “Create weapons now, ask questions later.” This is similar to Silicon Valley’s “Move Fast and Break Things” mantra, which Facebook is seeing the fallout for now. This time, we should learn from their mistakes and be considerate of the implications of the technology we create. + +The ultimate issue with the contract lies in the technology itself. It is easy to see what could go wrong with augmented reality powered by artificial intelligence: the AI could mistakenly categorize an unarmed civilian as hostile, the augmented reality device could malfunction and cause a soldier to make the wrong lethal decision, the facial recognition could be incorrect, and the list goes on. There’s also the issue of the technology falling into the hand of an oppressive regime, or the devices being hacked while soldiers are in the field. Fortunately, there is still time to have a conversation about these technologies before they are created and used. There is limited time to make a change, but change is still possible and necessary to create a better world. diff --git a/_posts/2018-12-3-Problematic-AI-Police-Body-Cam-Videos.md b/_posts/2018-12-3-Problematic-AI-Police-Body-Cam-Videos.md new file mode 100644 index 000000000000..272ed41843db --- /dev/null +++ b/_posts/2018-12-3-Problematic-AI-Police-Body-Cam-Videos.md @@ -0,0 +1,8 @@ +--- +title: Problematic Uses of AI in Interpreting Police Body-Cam Videos +categories: [software bias, programming oversights] +tags: [AI, police] +--- +In their [article](https://spectrum.ieee.org/computing/software/the-trouble-with-trusting-ai-to-interpret-police-bodycam-video) “The Trouble With Trusting AI to Interpret Police Body-Cam Video”, Dan Greene and Genevieve Patterson detail how a company, Axon, is using AI to interpret police body-cam video. When considering the usage of artificial intelligence in real-world applications, it is important to consider how this tool will be trained. Not just any data can be fed into the AI: the automated image-classification system can only learn from the data it is given. If there is incorrect or biased data, the result is an AI that will be incorrect and have a bias. If the dataset is incomplete, more problems can arise because there will be situations the AI hasn’t learned yet. All of this is further exacerbated by the mere fact that any AI system is error prone because it cannot be 100% accurate in all instances. The authors note that even if police know of these possible errors, “they might suffer from ‘automation bias,’ a tendency for people to accept a computer’s judgments over their own because of the perceived objectivity of machines.” Unfortunately, machines cannot be objective: they are created and maintained by humans, who have unconscious biases. In academia and research, AI experts deal with these problems by making their work open to the public, so it can be scrutinized by other experts and improved upon. Unfortunately, Axon and other companies have no obligation to do that. These kind of closed AI systems can further “rapidly degenerate” because mistakes that are not corrected can be used to train the system, further amplifying biases and creating unreliable results. + +Essentially, it appears the body-cameras police wear are a black box: the camera provides input, and certain events may be flagged that can result in police action. Since this technology is proprietary, it causes issues of accountability and transparency. It is impossible to determine if the AI is making correct suggestions to police, or if police are taking actions guided by a malfunctioning AI. There are other implications of using AI-powered body-cams as well. Axon is actively developing facial recognition for the body-cams. This means in the not-so-distant future, these body-cams could identify people in public, then record the time and location they were spotted. The government would have access to a database with information on where and when they can find individuals of interest. On the other hand, when the facial recognition makes a mistake, it could lead police to arresting the wrong individual. If the technology remains proprietary and the police do not publish detailed records of how the technology impacts their decisions, the public would be faced against a surveillance system that lies outside of their control. Except, the government would not be in control of this system: the technology is Axon’s. Axon’s technology could lead to the arrests of innocent individuals, or worse. Axon could further increase their profits by selling information about people from their database to advertisers. In the event the database is leaked or hacked, people’s location information would be exposed. This information cannot be changed like a password or credit card; location information contains human behaviors and habits. diff --git a/_posts/2018-12-6-Privacy-Modern-Technological-Capitalist-System.md b/_posts/2018-12-6-Privacy-Modern-Technological-Capitalist-System.md new file mode 100644 index 000000000000..2c67eff334f9 --- /dev/null +++ b/_posts/2018-12-6-Privacy-Modern-Technological-Capitalist-System.md @@ -0,0 +1,31 @@ +--- +title: Privacy in a Modern Technological Capitalist System +categories: [privacy, surveillance] +--- +The Internet spawned the digital age and completely changed the world. Just about everything is affected by technology: books, education, news, communication, transportation, games, and everything else in between. Most crucially, the Internet changed surveillance and advertising in enormous ways. In the past two decades, these changes have produced surveillance capitalism. In a world of surveillance capitalism, privacy is under constant threat. In this essay, I will discuss how artificial intelligence is being used as a tool for mass surveillance and how privacy is incompatible with capitalism in the digital age. + +Often, individuals trade their privacy for convenience. Modern cars include GPS to map directions from place to place. Smartphones use GPS to provide directions, swipe on local people, and track bike rides. These are useful services, but they require people to send their location data to companies – often numerous times throughout the day. Rettberg [wrote](http://jilltxt.net/books/Seeing-Ourselves-Through-Technology-full-book.pdf), “We live in a time that is teaching each of us that constantly being monitored is normal and even to our benefit”. Indeed, these services have become normal enough that one can use these services without giving a second though to their privacy or how companies could be using their data. Further, not using these services for the sake of privacy not only puts someone at a disadvantage to their peers, it is also viewed by society as an irrational choice. Consider this: if a privacy conscious individual only stopped using a cell phone to avoid being tracked by the cell phone provider and other entities, that individual would be at a disadvantage in making plans with friends, unaware of recent news, not have access to directions, unable to pay with his phone if he forgot his wallet, etc. Trying to resist and preserve one’s privacy results in missing out on the advantages, putting oneself in an economic disadvantage. Marcuse talks about this dilemma of an irrational choice in Social Implications of Technology. + +In a capitalist system, corporations compete for market share and customers. It essentially comes down to which company can compete better. In her article [“The Inverse Relationship between Secrecy and Privacy”](https://philpapers.org/rec/COHTIR) Cohen wrote, “In the emerging networked information economy, access to personal information about current and potential customers is considered the key ingredient in market success”. For a corporation, market success is critical to compete, satisfy shareholders and increase profits. It is in the company’s best interest to collect personal data to increase their effectiveness in marketing to and targeting potential customers. Companies can use current customer’s information to identify which marketing elements work and learn how to retain the customer. This data can also be sold to the government or other corporations. Companies that don’t collect personal information will be at a disadvantage when marketing and will be outcompeted by companies that are. Therefore, companies must surveil on consumers to survive in the long term. Personal data may not solely be used for marketing purposes. +Companies are using personal data to market and target advertising to consumers. This means individual privacy hinders capitalism. Without access to personal data, companies cannot target consumers efficiently. Thus, surveillance capitalism emerged to solve this problem. Personal data has become essential in the tech economy: companies use the data to generate revenue and increase profits. When a company gets large enough and has amplitudes of personal data, a new strategy develops: instead of selling user data, these multinational corporations can sell access to these users in the form of advertisements. Modern examples of multinational corporations are Google and Facebook, who serve as an effective duopoly in the advertising space. These corporations exhibit how privacy prevents profit: people voluntarily provide their data to the company to use their services, and the more data the company collects, the more they know about the people behind the accounts, allowing them to better sell advertisements to target them. + +Yet, this does not get to the heart of surveillance capitalism. The greatest use of data is not in what the corporation collects but in how they use that information. When a large amount of personal information is provided to corporations, they gain power and responsibility. Knowledge means power, but information means social control. As reported by [The Verge](https://www.theverge.com/2018/6/20/17482500/microsoft-ceo-satya-nadella-ice-contract-memo), Microsoft has been working with the United States Immigration and Customs Enforcement (ICE) to help the agency “process data on edge devices or utilize deep learning capabilities to accelerate facial recognition and identification”. Microsoft isn’t working with ICE because they are separating children from their families[^1], they are simply following the money as required to compete in a capitalist system and do what’s best for their shareholders. Due to the capitalist system it is a part of, Microsoft is better off not considering the morals or ethics of their work with the state. The more important question for them to consider is how much the state is willing to pay. + +Prior to the rise of tech companies, fears of surveillance were largely based on George Orwell’s novel Nineteen Eighty-Four. What’s seen today is slightly different: instead of homes with TV’s that have direct links to the government, people are more than happy to buy Amazon Alexa’s, Google Home’s and other smart devices to place in their homes. These devices are advertised to the consumer, while at the same time collecting bountiful information they can sell to the government. Companies create devices or provide services, collect information on their users, then hand the data to the government. This method works out to be quite effective: most people in the United States carry cell phones all day, every day. Facebook has more than [two billion](www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/) active monthly users. Big Brother gets to remain in the background, unseen, and allow companies to handle the data collection. Corporations and governments benefit from this system; citizens receive convenience and services for the price of privacy and surveillance. + +Through this system, the Internet has become the perfect tool of control. Data collection constricts the individual, resulting in a world without privacy to a world of conformity. As Cohen wrote, “Their purpose is to make human behaviors and preferences calculable, predictable, and profitable in aggregate.” Essentially, individualism is harder to predict; corporations push consumers towards conformity so they are more predictable and, thus, easier to extract money from. To do this, “wants [are] manufactured” (Cohen). Consider Spotify’s music recommendations: until one hears a song, they do not know they will like it. Spotify controls the music, and thus, the choices of what the one can listen to. Because Spotify controls the choices, they also [control the actions](https://medium.com/thrive-global/how-technology-hijacks-peoples-minds-from-a-magician-and-google-s-design-ethicist-56d62ef5edf3). How often do listeners of Spotify ask what songs aren’t in the catalog, or why one song is suggested versus another? Often, consumers are left out in the making of these decisions and increasingly left out on decision process in what algorithms provide to them, or rather, what they leave out. + +While consumers are left out of the decision process, that doesn’t mean they are ignorant to how these services work. There are memes circulating regarding how the FBI is carefully watching what we do and say on our phones and how something said around Alexa or a smartphone can result in ads following one everywhere online. Yet, these memes only serve as jokes; they are liked and shared, then people move on. Vaidhyanathan [writes](http://jilltxt.net/books/Seeing-Ourselves-Through-Technology-full-book.pdf), “we don’t know all the ways in which we are being watched or profiled – we simply know that we are. And we don’t regulate our behavior under the gaze of surveillance. Instead, we don’t seem to care”. The convenience and services offered by surveillant services are too great for many to resist the loss of privacy. To escape surveillance capitalism, the economic model must fundamentally change. Rettberg [wrote](http://jilltxt.net/books/Seeing-Ourselves-Through-Technology-full-book.pdf), “to not be tracked you have to have very sophisticated technical knowledge or have a lot of money.” The economic system of surveillance capitalism allows the wealthy and powerful to obfuscate themselves while citizens lives become more and more transparent. As we continue to be governed by a surveillance state that’s captured by the economic model, we will continue to head down the path of dystopia – until we are living in one. + +The Internet has spawned so many different technologies and each deserve analysis. For the focus of this paper, I will focus on artificial intelligence. In their [article](https://spectrum.ieee.org/computing/software/the-trouble-with-trusting-ai-to-interpret-police-bodycam-video) “The Trouble With Trusting AI to Interpret Police Body-Cam Video”, Dan Greene and Genevieve Patterson detail how a company, Axon, is using AI to interpret police body-cam video. When considering the usage of AI in real-world applications, it is important to consider how this tool will be trained. Not just any data can be fed into the AI: the automated image-classification system can only learn from the data it is given. If there is incorrect or biased data, the result is an AI that will be incorrect and have a bias. If the dataset is incomplete, more problems can arise because there will be situations the AI hasn’t learned yet. All of this is further exacerbated by the mere fact that any AI system is error prone because it cannot be 100% accurate in all instances. The authors note that even if police know of these possible errors, “they might suffer from ‘automation bias,’ a tendency for people to accept a computer’s judgments over their own because of the perceived objectivity of machines.” Unfortunately, machines cannot be objective: they are created and maintained by humans, who have unconscious biases. In academia and research, AI experts deal with these problems by their work open to the public, so it can be scrutinized by other experts and improved upon. Unfortunately, Axon and other companies have no obligation to do that. These kind of closed AI systems can further “rapidly degenerate” because mistakes that are not corrected can be used to train the system, further amplifying biases and creating unreliable results. + +Essentially, it appears the body-cameras police wear are a black box: the camera provides input, and certain events may be flagged that can result in police action. Since this technology is proprietary, it causes issues of accountability and transparency. It is a given that the software will make errors that could result in mistakes in the policing process. –CHANGE-- There are other implications of using AI-powered body-cams as well. Axon is actively developing facial recognition for the body-cams. This means in the not-so-distant future, these body-cams can identify people in public, then record the time and location they were spotted. The government would have access to a database with information on where and when they can find individuals of interest. On the other hand, when the facial recognition makes a mistake, it could lead police to arresting the wrong individual. If the technology remains proprietary and the police do not publish detailed records of how the technology impacts their decisions, the public would be faced against a surveillance system that lies outside of their control. Except, the government would not be in control of this system: the technology is Axon’s. Axon’s technology could lead to the arrests of innocent individuals, or worse. As discussed earlier, the database of people’s locations could be sold to advertisers. In the event the database is leaked or hacked, people’s location information would be exposed. This information cannot be changed like a password or credit card; location information contains human behaviors and habits. + +Earlier in the essay I mentioned how the wealthy could obfuscate themselves while citizens lives become more transparent. To elaborate, I want to consider how privacy can be commodified in a capitalist system. Apple is one of the only popular consumer brands that bases their brand and products around consumer’s privacy. They proclaim on their [website](https://www.apple.com/privacy/), “Apple products are designed to protect your privacy.” Other companies that promote consumer privacy are ProtonVPN and NordVPN. These virtual private networks encrypt internet traffic and keep data private from governments and ISPs, often claiming to remove records of internet traffic data. These examples of commodifying privacy illustrate how data can be protected from corporate and government surveillance, for a price. Yet, there is not guarantee. Apple’s hardware and software is not open source. Despite their claims, they could be collecting data on consumers. Or, at any time this privacy practice becomes inconvenient to their business model, they can change their practice. Hypothetically, Apple could declare tomorrow that they are transitioning into the advertising business. What would happen to their customer’s data then? Alternatively, a situation could exist where ProtonVPN is hacked. If nefarious actors installed loggers on their services, their entire business model is sidestepped. People who use these services specifically to circumvent government overreach and surveillance would be the most at risk. Essentially, privacy of individuals rests in the hands of corporations who publicly proclaim they are on their customers’ side but do not give evidence to protect the corporation’s property. Thus, individual privacy is at the mercy of corporations. + +Surveillance capitalism relies upon technology and more specifically, artificial intelligence. Could surveillance capitalism exist without the Internet and artificial intelligence? Artificial intelligence primarily relies upon data. The Internet has enabled data collection at a scale never seen before, and interactions from buying and selling good to personal communication take place on the web. Certainly, fewer data would be recorded without these technologies. However, record keeping was common before the Internet. Today’s tools allow the centralization and easy exchange of these records. This is what makes modern surveillance so powerful and effective. But, surveillance existed before these technologies were developed. The idea of the panopticon prison system has existed since the 18th century[^2]. Radio transmissions could be tapped by anyone close enough. Police offers could wait outside houses in unmarked cars to record the occupants’ comings and goings. Mail package characteristics can be inspected. The difference between these surveillance techniques and surveillance using today’s technology is the sheer scale and invisibility. Millions of messages are sent on Facebook each day, and each message can be scanned and searched very quickly and without notice. By combining message contents with message metadata, such as who the message was sent to, who sent it, the timestamp, IP address of sender and receiver, and the sender and receiver’s device information, observations can be made without the consumer’s knowledge. With all that information, a map of sender and receiver’s locations through the day as they communication could be created. Marketing departments can infer socio-economic status of consumers can by the metadata of the devices they used, their location, and details in their messages. Combine this with the other two billion people using Facebook, and you now have very detailed information about the population at an unprecedented scale. Consumers do not have access to all the information Facebook has on them, and Facebook does not tell consumers how they use the information they collect. This kind of surveillance is unlike earlier examples listed because of how well data can be aggregated and used for a variety of purposes in a manner that is invisible to the people using the services every single day. + +The Internet frames our thinking, knowledge, and behavior. The internet gave birth to artificial intelligence, which is primarily used to target people and maximize profits. Despite its great potential, artificial intelligence and the Internet have become tools of mass surveillance, advanced intrusive advertising technology and a means of social control. Privacy is becoming eroded at an astonishingly fast pace far beyond what any historic authoritarian state could’ve accomplished. If we want to avoid creating a real-world dystopia, surveillance capitalism must be abolished and replaced. + +[^1]: Microsoft’s CEO Satya Nadella made a public statement regarding their ICE contract: “I want to be clear: Microsoft is not working with the U.S. government on any projects related to separating children from their families at the border. Our current cloud engagement with U.S. Immigration and Customs Enforcement (ICE) is supporting legacy mail, calendar, messaging and document management workloads.” +[^2]: Bentham, Jeremy (1798), Proposal for a New and Less Expensive mode of Employing and Reforming Convicts; quoted in Evans 1982, p. 195. \ No newline at end of file diff --git a/_posts/2018-12-7-Fortnite-Addiction-Technology-Designed-People-Engaged.md b/_posts/2018-12-7-Fortnite-Addiction-Technology-Designed-People-Engaged.md new file mode 100644 index 000000000000..f3fdf86136b4 --- /dev/null +++ b/_posts/2018-12-7-Fortnite-Addiction-Technology-Designed-People-Engaged.md @@ -0,0 +1,10 @@ +--- +title: "Fortnite Addiction: How Technology is Designed to Keep People Engaged" +categories: [software bias, programming oversights, platform neglect, technological manipulation] +tags: [gaming, addiction] +--- +In their Bloomberg [piece](https://www.bloomberg.com/news/articles/2018-11-27/fortnite-addiction-prompts-parents-to-turn-to-video-game-rehab) “Fortnite Addiction Is Forcing Kids Into Video-Game Rehab,” Jef Feeley and Christopher Palmeri discuss how parents have trouble regulating their children’s’ videogame use. Some parents even had to resort sending their kids to rehab. But, Fortnite was also cited as the cause for breakups. This means that videogame addiction isn’t just a problem children face. In fact, gaming disorder is recognized by the World Health Organization. However, this may lead some to believe that it is the responsibility of the parents and players to regulate their gameplay and avoid addiction at their own. This type of thinking completely ignores the reality of the situation: game studios, along with other technology companies, design their products to trigger dopamine receptors in the brain. This makes their products feel rewarding, and drives user engagement. Consider the feeling when logging into Facebook and seeing new notifications, or when glancing at your phone and seeing you have new messages. Chemically, the same thing is happening in your brain as if you had just eliminated someone in Fortnite or you ate that second cookie. + +This is not to say that people are not responsible for their actions that lead to videogame addictions. However, companies need to be held responsible for the content they create. Taking Fortnite as an example, the game is colorful and cartoonish, filled with characters that can be customized (with purchases) and, with enough playing time, can unlock special dance moves and new items. Players have weekly and daily challenges they can complete to level up. Practically every component of the game is made to be enticing. Since Fortnite is a free-to-play game, it is in the Epic Game’s (the studio behind Fortnite) best interest to maximize playing time. The more someone plays the game, the more likely they are to complete challenges and unlock rewards, which triggers dopamine receptors. Once this occurs enough, players will associate the game with the pleasant rewarding feelings. This engagement can then lead to players purchasing items or a Battle Pass (allows players to unlock even more items, dance moves, and characters). The aspect of purchasing these items is another dopamine trigger for a few reasons. First, these are normally items that are rare and can only be obtained by purchasing. Second, players show-off their items to other players during the game. This has a great social effect in the game. Players will show off their new items to friends and other players in the game. Imagine playing Fortnite and eliminating a player with a default character. Now, imagine playing Fortnite again and this time, eliminating a player with the rare edition Santa character that could only be purchased during Christmas Day last year. That elimination feels more rewarding that the first. + +Certainly, Fortnite is an entertaining game to play. Not everyone who plays the game develops an addiction. Still, there is a non-trivial amount of people who do develop addiction symptoms due to the nature of the game’s addiction qualities. Fortnite is designed to be an enjoyable game, and part of that effect is the colorful landscape and riveting character designs. Simply put, the game would be less popular if it was only in black and white with each character looking the same. The smooth animations and cool sound effects drive engagement. Thus, Fortnite is responsible for creating an addictive game, because it was designed for that specific purpose. In an ideal world, Epic Games would either add limits to the game or reduce the addictive elements. Unfortunately, doing so would likely reduce the game’s in-store purchases and its popularity. That also would not fix the problem at hand. As mentioned, this is a popular practice among game studios and other technologies. Facebook’s notifications are red not just to draw people’s attention but also to trigger the excitement of a new update. Many technological interfaces are designed specifically to draw people in and keep them engaged. As a society, we need to confront this problem before it worsens. diff --git a/_posts/2019-12-27-how-reclaim-your-privacy.md b/_posts/2019-12-27-how-reclaim-your-privacy.md new file mode 100644 index 000000000000..50b04e96cdeb --- /dev/null +++ b/_posts/2019-12-27-how-reclaim-your-privacy.md @@ -0,0 +1,41 @@ +--- +title: "How to Reclaim Your Privacy" +categories: [privacy, surveillance] +--- +Your privacy is up for grabs, but should you care? Why does it matter if companies are trading data about your Starbucks habits, your fitness routine or even your favorite weekend destination? It all comes down to control. Our current data environment creates asymmetries of knowledge and power. Who has your data? Who decides what your data is used for? Who decides *who decides* what your data is used for? Unfortunately, there aren’t any laws to protect us. Companies have confusing marketing messages that conflict with their own hard to read privacy policies (aka surveillance policies). If you feel powerless, out of options, or just confused on what you can do to protect what little privacy you have left, here are some steps you can take. + +1. ### Use encrypted communication +The state-of-the-art privacy and security protocols are end-to-end encrypted communication platforms. Data is encrypted on the device, through transportation to the servers, and decrypted on the receiving device. This means the service - the company or network the messages are sent through - cannot access the communications, even if compelled to do so by the government; although they may still know who you are speaking to, how often, and when. The best tools to use are Signal for messaging and ProtonMail for email. + +2. ### Browse the web on your terms +Firefox is the ultimate web browser for protecting your privacy online. Enhanced tracking protections block social media trackers, cross-site tracking cookies, tracking content, cryptominers and fingerprinters. In addition, Firefox is backed by privacy-first nonprofit Mozilla, putting people before profits by keeping the internet open and accessible to all. Available on all major platforms. + +3. ### Search without leaving a trace +Searching is personal; let’s keep it that way. DuckDuckGo is a search engine free of trackers and doesn’t store personal information or collect your searches. Set it as your default search engine on your computer and phone to leave your search history in the past. + +4. ### Keep your location yours +Revealing your location can, over time, reveal patterns and personal information about where you live, your favorite places to eat, your daily commute and more. When apps ask for your location, make it a habit of saying no - then when you really need to give your location, turn it back on - but remember to turn it off afterwards. Go through all of your apps and turn off location for the ones that don’t need it - or change the setting so they can only get your location while you’re using the app. Don’t tag your location on your posts, images, or tweets. + +5. ### Turnoff Bluetooth and WiFi +While you’re not using them; they’re constantly broadcasting identifiers that are easy to track. Don’t let apps access to your Bluetooth unless they really need it. For ultimate privacy, turn on airplane mode or power off your phone to prevent your cellphone provider from tracking you. + +6. ### Be mindful +Does that app asking for your name and address really need it? Consider using fake information. Is the website you’re on secure? Look for a padlock or “https” in the address bar. + +7. ### Your new SSN: your email and phone number +Email address and phone numbers are the number one identifiers for tracking people. Consider creating a separate email address to use when entering fake information for the apps and sites that don’t need it. When asked for your phone number and you can’t use a fake one, consider if the you really need to use the service. + +8. ### Take a break from social media +Facebook (also the owner of Instagram) is one of the most powerful surveillance companies. Using social media less gives them less data, which gives you more freedom and control over your life. If you can stand not using your social media accounts for a while, consider deleting them. + +9. ### Use cash +Every transaction you make with a card goes through at least four companies, each with different data collection practices. It only takes one company to build a profile about your spending habits. These could then be sold to advertisers to shape your behavior in their favor. + +10. ### Don’t bring spyware into your home +Alexa and Google Home devices may seem fun and cool, in reality they are anything but. Some recordings are listened to by real people across the globe. These devices can analyze your voice patterns to identify you in any recording. Plus, these devices only generate more data about you to feed into the machine. + +*** +### Bonus: Nuclear option +Of course, getting rid of your cell phone, not using cars with built-in GPS, and avoiding areas with cameras is the most effective way to take back your privacy. But the tradeoffs with this option is large, which is why many people don't try. + +_For more tips and details, visit [datadetoxkit.org](datadetoxkit.org) and [ssd.eff.org](ssd.eff.org)._ diff --git a/_posts/2022-12-22-advanced-data-protection.md b/_posts/2022-12-22-advanced-data-protection.md new file mode 100644 index 000000000000..723a16edb8a7 --- /dev/null +++ b/_posts/2022-12-22-advanced-data-protection.md @@ -0,0 +1,24 @@ +--- +title: "Maximizing Privacy and Security with iCloud's Advanced Data Protection" +categories: [privacy,security,apple] +--- +Last week, Apple [released](https://appleinsider.com/articles/22/12/13/apples-advanced-data-protection-feature-is-here---what-you-need-to-know) Advanced Data Protection, a new way to fully encrypt iCloud data end-to-end (E2EE). This new feature will make your account data so secure that not even Apple can read it. It provides an extra layer of privacy by reducing the data that Apple knows about you and what is accessible through government requests and warrants. [Additional data protected](https://support.apple.com/en-us/HT202303) with the highest level of cloud security in the industry include photos, notes, backups, messages, and more. The only data not end-to-end encrypted are contacts, calendars, and email. +However, it's important to note that this feature is optional and comes with warnings for a good reason. Choosing to secure your data this way means you are solely responsible for recovering your account if you lose access. While setting up Advanced Data Protection is relatively straightforward, making your account easy to recover is not. In the post, I'll walk through enabling Advanced Data Protection on my iCloud account and discuss how to prevent single points of failure that may lock you out of your account, plus the considerstions you'll need to make before enabling this new feature. + +## How to enable Advanced Data Protection +The first step to protect your data using an iPhone is to ensure that your trusted devices are compatible with Advanced Data Protection. Your devices must be updated with the latest software, such as iOS 16.2 and macOS 13.1. If you have an older device, like a 2015 MacBook Pro, that isn't compatible with the latest software version, that device won't be eligible for Advanced Data Protection. It must be removed from your iCloud account to activate the feature. This can be a dealbreaker for some people. Still, it's essential to consider the trade-off between the added security of Advanced Data Protection and the potential loss of access to older devices. +### Saying goodbye to my MacBook +In my case, I had to remove my seven-year-old MacBook Pro from my iCloud account because it wasn't compatible with the latest software. While it was a sad realization that this feature isn't backward compatible, I saw it as a small price to pay since my MacBook Pro isn't my primary computer anyway. I turned it on one last time to sync my photos and then disconnected it from my iCloud account. +### For Windows Users +If Advanced Data Protection doesn't work with older Apple devices, does that mean that Windows devices are also doomed? Not entirely. Apple has released iCloud for Windows (Version 14) on the Microsoft store, which allows you to sync photos, contacts, and passwords to your PC with Advanced Data Protection enabled. However, the implementation is incomplete - for some reason, PCs cannot receive verification codes. This means that while you have access to all of your iCloud data on a Windows device, you won't be able to generate the verification codes needed to access your account. This may encourage ecosystem lock-in by requiring Apple devices to receive Apple ID verification codes. Another potential hiccup awaits users on Windows 10: I had to reinstall it a few times for my phone to recognize the PC was using Version 14 and was fully up-to-date. Unfortunately, it has been painfully slow at downloading my iCloud Photos. It's downloading one to two photos per hour on a high-speed network (150+ Mbps down). I will continue to troubleshoot and update here if I can get this resolved. +## Setup recovery method +The next step in setting up Advanced Data Protection is establishing recovery methods. You have two options: a recovery contact and a 26-digit recovery key. You only need one method, but having both is a good idea. A recovery key allows you to get back into your account independently, but you'll need to keep it secure since it can be used to access your data. A recovery contact can generate a verification code for you to get into your account. Both of these options have trade-offs and risks. Recovery contacts are a convenient feature, but they could be vulnerable to social engineering attacks or unavailable to reach. If your recovery contact is with you and both of your phones are stolen, it could be difficult to access your account. It's important to keep your recovery contact a secret and have a high trust in them. To prevent the worst, Apple has also [taken measures](https://support.apple.com/guide/security/account-recovery-contact-security-secafa525057/web) to prevent account takeovers by recovery contacts. To recover an account, you may need to provide details such as one of the passwords used to lock your iPhone or Mac, and the recovery process isn't available if the iCloud account is currently in active use. + +While it may be tempting to set up only a recovery contact and skip the more complicated recovery key method, I ran into a hiccup while adding a new MacBook to my account that proved the usefulness of not relying on just one recovery method. After I signed into my new MacBook, it immediately started downloading data from my account. But then it required that I confirm my iPhone password. This passcode is required to unencrypt my account data (that had already started downloading, anyways..) but more troubling is that my passcode wouldn't work. I confirmed it was indeed accurate by typing the passcode into my iPhone. I was able to verify my account through my recovery key. There wasn't an option to unlock with another device or a recovery contact. +On the other hand, you must keep the recovery key in a secure place, making it challenging to keep with you while traveling unless it's on a locked device that isn't signed into your iCloud account. This leads to a potential single point of failure: our phones. Unfortunately, due to the reliance on SMS as a verification option and the iPhone as a trusted device, if you lose or break your iPhone, the only way to access it is by verifying your identity with one of your trusted devices. However, you'll have to recover your account if they were also lost or stolen. This is why setting up recovery contacts and a recovery key is critical. But what if you're traveling and can't reach your recovery contact and don't have your recovery key with you? Fortunately, your data is still secure, but it may only be accessible once you can get a verification code from a trusted contact or access your recovery key. In this case, having a smartwatch can be handy since the recovery code can be stored on it, and if it's an Apple Watch, it can also receive verification codes. +## You should have at least three different avenues for recovery +Once you've set up recovery methods and removed incompatible devices from your account, you can enable Advanced Data Protection. It's a simple process, but safeguarding yourself from losing access to your iCloud account isn't. I recommend having three avenues of recovery in case you lose access to your iCloud account. One is the recovery contact. If you cannot reach this person, I recommend storing your recovery key on a secure device that is always with you, such as a smartwatch or non-Apple device you would take with you on your travels. However, this device could also be destroyed or stolen. The third failsafe for recovery is writing down the recovery key and storing it in a safe, preferably fire and waterproof. This way, you have multiple options for recovering your account should you lose access, and you can choose the one that works best for you based on your situation. +### Do you use iCloud.com? +If you're an active user of iCloud.com, it will be [disabled](https://support.apple.com/guide/security/advanced-data-protection-for-icloud-sec973254c5f/web) when enabling Advanced Data Protection. This is because the data is more secure now and can no longer be read by iCloud. However, it can be re-enabled on any device, and when logging into the website, only data accessible by iCloud.com will be allowed to be read. This setting shouldn't be enabled for ultimate security, but this is a good fallback in case you need it. +## Apple can't help you with Account Recovery going forward +Advanced Data Protection is a great step forward regarding privacy and security. It fully encrypts more iCloud data end-to-end, making it so secure that even Apple can't read it. However, it's important to remember that relying on phones as the primary method of accessing accounts can be risky, as they can be easily broken or stolen. This is why it's crucial to have multiple recovery options to avoid a single point of failure. Setting up recovery contacts and creating a recovery key will be helpful in case you lose access to your account. You can store the recovery key on a secure device, such as a smartwatch or non-Apple device, or in a safe. We must also remember that Advanced Data Protection has some limitations, such as the lack of compatibility with older devices or the need to rely on recovery methods in case of a single point of failure. By considering these potential risks and taking proactive steps to protect yourself, you can ensure your data remains secure using Advanced Data Protection. diff --git a/archive/2020-03-27-bisexual-pride-flag-emoji-proposal.md b/archive/2020-03-27-bisexual-pride-flag-emoji-proposal.md new file mode 100644 index 000000000000..1742996756e9 --- /dev/null +++ b/archive/2020-03-27-bisexual-pride-flag-emoji-proposal.md @@ -0,0 +1,44 @@ +--- +title: "Bisexual Pride Flag Emoji Proposal" +categories: [emoji] +header: + image: /assets/images/bisexual_flag.png + image_description: "The bisexual pride flag" +--- +**Update 11/20: Sign the [petition](https://change.org/BiFlagEmoji)!** + +**Update April 2021: checkout our [#MorePrideEmojis](https://moreprideemojis.com) campaign!** + +On February 3, I submitted the first proposal for the Bisexual Pride Flag Emoji. During this time, I was also consulting with friends and the pioneers behind the [transgender flag emoji](https://www.tedeytan.com/transemoji). Based upon the feedback I received, I resubmitted an updated proposal on February 5. On February 11, I noticed the proposal listed on the Unicode Requests page. [Here]({{site.url}}/assets/documents/Proposal_For_Bisexual_Flag_Emoji.pdf) is the latest version of the proposal. + +Despite emoji being a universal language used everyday by people all around the world, a handful of people in San Francisco at the Unicode Consortium decide the fate of new emojis. The Unicode Emoji Subcommittee accepts proposals for new emoji based upon criteria like is the emoji distinguishable at its small size, does the emoji contribute to the conversation, and will a large amount of people likely use the new emoji. They have a [template](https://unicode.org/emoji/proposals.html#emoji_proposals_form) for submitting a proposal, and each point is addressed in the proposal I submitted. + +Once I received confirmation that my proposal was received, I waited, anxiously. The transgender flag took 4 years, a team of people from around the world, and intense public pressure. There was even a [documentary video](https://www.youtube.com/watch?v=T5y5Sfh__-s) on YouTube about the process they had to go through. I had written the proposal in less than a day and couldn’t find a single article from a reputable source advocating for a bisexual flag emoji. + +On March 24, I received a reply from the Unicode Emoji Subcommittee: + + + +They provided no reason for the rejection, which indicates that despite following their guidelines for the proposal, they didn't see the bisexual community deserving an emoji to express themselves. Yet, even pirates have a flag (🏴☠️). + +[](https://unicode.org/emoji/emoji-requests.html) + +I knew this wouldn’t be easy from the start. The transgender flag emoji required multiple submissions, a team of people, and intense media coverage. I was the only person who worked on this first submission. That may have been a mistake, but I wanted to submit the proposal in time for the deadline. + +So, what’s next? To move forward, I think it’s best to recruit some more people in this effort, talk strategy, and try to get some media coverage. The more attention we can bring to this, the more pressure we can put on Unicode. Ultimately, I want to submit the proposal again, but we need to come back stronger than before. If you want to help this happen, please [reach out](mailto:hey@tannermarino.com). Together, we can bring visibility to bisexual people everywhere. + +## Update: March 30, 2020 + +Someone shared with me that there is a bisexual flag emoji in Skype. This is great for bi visibility and supports our iniative. When companies begin implementing emojis on their own when Unicode fails to do so, it adds pressure for Unicode to act. Shoutout to Skype for leading with us and their inclusion of several pride flag emojis. + +## Update: November 16, 2020 +Thanks to everyone who has reached out for the support so far. Today, we launched the a [petition](https://change.org/BiFlagEmoji) to gather signatures to show the support the emoji has and increase awareness of the issue. So far we have over 200 supporters. I encourage all of our supporters and allies to sign and share the petition. This is just the beginning. More to come. + +## Update: November 23, 2020 +A week later, we've surpassed 8,500 supporters on the petition! We were also featured on [LGBTQ Nation](https://www.lgbtqnation.com/2020/11/bisexual-activist-asked-bi-flag-emoji-group-governs-emojis-said-no/) and [queer.de](https://www.queer.de/detail.php?article_id=35793) (German). Thanks again to everyone for the support and for sharing the petition. We are making good progress! + +## Update: November 25: 2 more articles and 12,500 supporters +Yesterday we reached 10,000 and today we are still climbing (currently at 12,500). An article in [Pink News](https://www.pinknews.co.uk/2020/11/24/bisexual-pride-flag-emoji-plans-rejected-unicode-consortium-tanner-marino/) was released yesterday, and one in [Mashable](https://mashable.com/article/bisexual-pride-flag-emoji-rejected-by-unicode/) was released today (also available in [Spanish](https://www.homosensual.com/lgbt/bisexuales/dejaron-a-la-bandera-bisexual-fuera-de-los-nuevos-emojis/)). We've received many comments on the petition, social media and articles in various languages spanning the globe. People from all over the world support adding a bi flag emoji. Thanks to everyone for the support so far, including Change.org staff for their help. If you haven't already, consider sharing the petition! + +## Update: December 2: 15,000 supporters. +Wow. In just over two weeks (17 days), we hit 15,000 signatures. We are building a movement. The momentum and support so far has been outstanding. This is an important milestone worth celebrating. Still, we have a ways to go: we haven't heard from Unicode or from any of their voting members (Apple, Adobe, Facebook, Google, Microsoft, Netflix, etc). Let's keep up the momentum: if we each shared the petition to just one more person, we could double our supporters to reach 30,000. diff --git a/archive/2021-09-23-very-special-bi-visibility-day.md b/archive/2021-09-23-very-special-bi-visibility-day.md new file mode 100644 index 000000000000..6db7fa3a38ff --- /dev/null +++ b/archive/2021-09-23-very-special-bi-visibility-day.md @@ -0,0 +1,18 @@ +--- +title: "A Very Special Bi Visibility Day" +categories: [bisexuality] +--- + +Happy Bi Visibility Day 💖💜💙 + +[Register](https://events.zoom.us/e/view/uRODlDU3TW2PtXCi_QQN5A) for my speech on Saturday, September 25 at 11:30am Pacific Time! (session: Lightning Talks 4) + +This year, this day is especially important to me for two reasons. First, my dear friend Jan Bambach offered me the opportunity to be a [guest writer](https://www.vielbunt.org/news/bipride-in-darmstadt/) this year for their celebration of Bi Visibility Day in Darmstadt, Germany. This is their first year hanging up the bi flag in celebration of Bi+ pride. Second, in just two days I will be speaking at the [International Bisexual Research Conference](https://www.bisexualresearch.com/conference) about my work on the Bisexual Pride Flag Emoji, followed by a breakout session. These two events culminate the [past year's](https://tannermarino.com/2020/bisexual-pride-flag-emoji-proposal/) worth of my activism and I am so excited to share it with the rest of the world. + +Here is my post in celebration of bi visibility day: + +Bisexuality to me comes down to being attracted to 1) people of my gender and 2) people that are not my gender. What makes being bi so beautiful is the wide range of potential compatible partners while breaking the gender barrier. + +Even with gay rights on the rise throughout the world, there remains intense biphobia within the queer community. This is despite bi people representing half of LGBTQIA+ people. Sadly, this has lead many bi individuals to not feel included in the broader queer community. Bi people frequently question whether they are gay enough; some feel pressure to “pick a side”; those dating the opposite gender fear being assumed to be in a hetero relationship. When it comes to dating, bi people are all too often questioned about their "guy/girl ratio" which reinforces the gender binary the broader community has been trying to break for years. Even on dating sites, promiscuity is assumed, especially with couples looking for a third. + +Yet, these challenges are all of our challenges. Now, more than ever, we need to celebrate the fluidity and diversity of sexuality. Just like the community gathered support for transgender people, so can we support our bi friends and family in breaking the stereotypes and pushing forward to build a more inclusive world for all. diff --git a/assets/documents/Proposal_For_Bisexual_Flag_Emoji.pdf b/assets/documents/Proposal_For_Bisexual_Flag_Emoji.pdf new file mode 100644 index 000000000000..dcc6885193e4 Binary files /dev/null and b/assets/documents/Proposal_For_Bisexual_Flag_Emoji.pdf differ diff --git a/assets/images/advanced-data-protection.PNG b/assets/images/advanced-data-protection.PNG new file mode 100644 index 000000000000..eaf685e75190 Binary files /dev/null and b/assets/images/advanced-data-protection.PNG differ diff --git a/assets/images/bisexual_flag.png b/assets/images/bisexual_flag.png new file mode 100644 index 000000000000..311825096eba Binary files /dev/null and b/assets/images/bisexual_flag.png differ diff --git a/assets/images/emoji_rejection.png b/assets/images/emoji_rejection.png new file mode 100644 index 000000000000..54dd7b27887e Binary files /dev/null and b/assets/images/emoji_rejection.png differ diff --git a/assets/images/profile.jpeg b/assets/images/profile.jpeg new file mode 100644 index 000000000000..8ca90e095ce4 Binary files /dev/null and b/assets/images/profile.jpeg differ diff --git a/assets/images/recovery-key.jpg b/assets/images/recovery-key.jpg new file mode 100644 index 000000000000..a69c707b0972 Binary files /dev/null and b/assets/images/recovery-key.jpg differ diff --git a/assets/images/skype_emojis.png b/assets/images/skype_emojis.png new file mode 100644 index 000000000000..2448c782f006 Binary files /dev/null and b/assets/images/skype_emojis.png differ diff --git a/assets/images/unicode_reply.png b/assets/images/unicode_reply.png new file mode 100644 index 000000000000..4bb1967225b6 Binary files /dev/null and b/assets/images/unicode_reply.png differ diff --git a/docs/Gemfile b/docs/Gemfile deleted file mode 100644 index 5c41b36a2465..000000000000 --- a/docs/Gemfile +++ /dev/null @@ -1,17 +0,0 @@ -source "https://rubygems.org" - -gem "github-pages", group: :jekyll_plugins - -gem "tzinfo-data" -gem "wdm", "~> 0.1.0" if Gem.win_platform? - -# If you have any plugins, put them here! -group :jekyll_plugins do - gem "jekyll-paginate" - gem "jekyll-sitemap" - gem "jekyll-gist" - gem "jekyll-feed" - gem "jemoji" - gem "jekyll-include-cache" - gem "jekyll-algolia" -end diff --git a/docs/_config.dev.yml b/docs/_config.dev.yml deleted file mode 100644 index 45df3dfe29a0..000000000000 --- a/docs/_config.dev.yml +++ /dev/null @@ -1,13 +0,0 @@ -# Develop override settings - -url: http://localhost:4000 - -analytics: - provider: false - -comments: - disqus: - shortname : "mmistakes-dev" - -sass: - style: expanded \ No newline at end of file diff --git a/docs/_config.yml b/docs/_config.yml deleted file mode 100644 index 46d78b79ae7d..000000000000 --- a/docs/_config.yml +++ /dev/null @@ -1,339 +0,0 @@ -# Welcome to Jekyll! -# -# This config file is meant for settings that affect your entire site, values -# which you are expected to set up once and rarely need to edit after that. -# For technical reasons, this file is *NOT* reloaded automatically when you use -# `jekyll serve`. If you change this file, please restart the server process. - -remote_theme : "mmistakes/minimal-mistakes" - -minimal_mistakes_skin : "default" # "air", "aqua", "contrast", "dark", "dirt", "neon", "mint", "plum", "sunrise" - -# Site Settings -locale : "en-US" -title : "Minimal Mistakes" -title_separator : "-" -subtitle : "A Jekyll theme" -name : &name "Michael Rose" # &name is a YAML anchor which can be *referenced later -description : &description "A flexible Jekyll theme for your blog or site with a minimalist aesthetic." -url : https://mmistakes.github.io # the base hostname & protocol for your site e.g. "https://mmistakes.github.io" -baseurl : "/minimal-mistakes" # the subpath of your site, e.g. "/blog" -repository : "mmistakes/minimal-mistakes" -teaser : # path of fallback teaser image, e.g. "/assets/images/500x300.png" -logo : # path of logo image to display in the masthead, e.g. "/assets/images/88x88.png" -masthead_title : # overrides the website title displayed in the masthead, use " " for no title -# breadcrumbs : false # true, false (default) -words_per_minute : 200 -comments: - provider : "false" # false (default), "disqus", "discourse", "facebook", "staticman_v2", "staticman", "utterances", "custom" - disqus: - shortname : - discourse: - server : # https://meta.discourse.org/t/embedding-discourse-comments-via-javascript/31963 , e.g.: meta.discourse.org - facebook: - # https://developers.facebook.com/docs/plugins/comments - appid : - num_posts : # 5 (default) - colorscheme : # "light" (default), "dark" - utterances: - theme : # "github-light" (default), "github-dark" - issue_term : # "pathname" (default) -staticman: - allowedFields : # ['name', 'email', 'url', 'message'] - branch : # "master" - commitMessage : # "New comment by {fields.name}" - filename : # comment-{@timestamp} - format : # "yml" - moderation : # true - path : # "_data/comments/{options.slug}" - requiredFields : # ['name', 'email', 'message'] - transforms: - email : # "md5" - generatedFields: - date: - type : # "date" - options: - format : # "iso8601" (default), "timestamp-seconds", "timestamp-milliseconds" - endpoint : # URL of your own deployment with trailing slash, will fallback to the public instance -reCaptcha: - siteKey : # "6LdRBykTAAAAAFB46MnIu6ixuxwu9W1ihFF8G60Q" - secret : # "PznnZGu3P6eTHRPLORniSq+J61YEf+A9zmColXDM5icqF49gbunH51B8+h+i2IvewpuxtA9TFoK68TuhUp/X3YKmmqhXasegHYabY50fqF9nJh9npWNhvITdkQHeaOqnFXUIwxfiEeUt49Yoa2waRR7a5LdRAP3SVM8hz0KIBT4=" - -atom_feed: - path : # blank (default) uses feed.xml - -search : true # true, false (default) -search_full_content : true # true, false (default) -search_provider : algolia # lunr (default), algolia -algolia: - application_id : QB6HVGBSBA # YOUR_APPLICATION_ID - index_name : minimal_mistakes # YOUR_INDEX_NAME - search_only_api_key : 9d5014e5bbc77372547bce778dfa5663 # YOUR_SEARCH_ONLY_API_KEY - powered_by : true # true (default), false - files_to_exclude: - - _posts/2017-11-28-post-exclude-search.md - -# SEO Related -google_site_verification : "UQj93ERU9zgECodaaXgVpkjrFn9UrDMEzVamacSoQ8Y" # Replace this with your ID, or delete -bing_site_verification : -yandex_site_verification : -naver_site_verification : - -# Social Sharing -twitter: - username : &twitter "mmistakes" -facebook: - username : &facebook "michaelrose" - app_id : - publisher : -og_image : "/assets/images/site-logo.png" # Open Graph/Twitter default site image -# For specifying social profiles, used in _includes/seo.html -# - https://developers.google.com/structured-data/customize/social-profiles -social: - type : # Person or Organization (defaults to Person) - name : # If the user or organization name differs from the site's name - links: # An array of links to social media profiles - - "https://twitter.com/mmistakes" - - "https://www.facebook.com/michaelrose" - -# Analytics -analytics: - provider : "google-universal" # false (default), "google", "google-universal", "custom" - google: - tracking_id : "UA-2011187-3" # Replace this with your ID, or delete - anonymize_ip : true - - -# Site Author -author: - name : *name # *name is a YAML reference pointing to the &anchor earlier - avatar : "/assets/images/michael-rose.jpg" - bio : "Just another *boring*, *tattooed*, *time traveling*, *designer*." - location : "Buffalo, NY" - links: - - label: "Made Mistakes" - icon: "fas fa-fw fa-link" - url: "https://mademistakes.com" - - label: "Twitter" - icon: "fab fa-fw fa-twitter-square" - url: "https://twitter.com/mmistakes" - - label: "GitHub" - icon: "fab fa-fw fa-github" - url: "https://github.com/mmistakes" - - label: "Instagram" - icon: "fab fa-fw fa-instagram" - url: "https://instagram.com/mmistakes" - - -# Site Footer -footer: - links: - - label: "Twitter" - icon: "fab fa-fw fa-twitter-square" - url: "https://twitter.com/mmistakes" - - label: "GitHub" - icon: "fab fa-fw fa-github" - url: "https://github.com/mmistakes" - - label: "Instagram" - icon: "fab fa-fw fa-instagram" - url: "https://instagram.com/mmistakes" - - -# Reading Files -include: - - .htaccess - - _pages -exclude: - - "*.sublime-project" - - "*.sublime-workspace" - - vendor - - .asset-cache - - .bundle - - .jekyll-assets-cache - - .sass-cache - - assets/js/plugins - - assets/js/_main.js - - assets/js/vendor - - Capfile - - CHANGELOG - - config - - Gemfile - - Gruntfile.js - - gulpfile.js - - LICENSE - - log - - node_modules - - package.json - - Rakefile - - README - - tmp -keep_files: - - .git - - .svn -encoding: "utf-8" -markdown_ext: "markdown,mkdown,mkdn,mkd,md" - - -# Conversion -markdown: kramdown -highlighter: rouge -lsi: false -excerpt_separator: "\n\n" -incremental: false - - -# Markdown Processing -kramdown: - input: GFM - hard_wrap: false - auto_ids: true - footnote_nr: 1 - entity_output: as_char - toc_levels: 1..6 - smart_quotes: lsquo,rsquo,ldquo,rdquo - enable_coderay: false - - -# Collections -collections: - docs: - output: true - permalink: /:collection/:path/ - recipes: - output: true - permalink: /:collection/:path/ - pets: - output: true - permalink: /:collection/:path/ - portfolio: - output: true - permalink: /:collection/:path/ - - -# Defaults -defaults: - # _posts - - scope: - path: "" - type: posts - values: - layout: single - author_profile: true - read_time: true - comments: true - share: true - related: true - # _pages - - scope: - path: "_pages" - type: pages - values: - layout: single - author_profile: true - # _docs - - scope: - path: "" - type: docs - values: - layout: single - read_time: false - author_profile: false - share: false - comments: false - sidebar: - nav: "docs" - # _recipes - - scope: - path: "" - type: recipes - values: - layout: single - author_profile: true - share: true - comments: true - # _pets - - scope: - path: "" - type: pets - values: - layout: single - author_profile: true - share: true - comment: true - # _portfolio - - scope: - path: "" - type: portfolio - values: - layout: single - author_profile: false - share: true - - -# Sass/SCSS -sass: - sass_dir: _sass - style: compressed # http://sass-lang.com/documentation/file.SASS_REFERENCE.html#output_style - - -# Outputting -permalink: /:categories/:title/ -# paginate: 5 # amount of posts to show -# paginate_path: /page:num/ -timezone: America/New_York # https://en.wikipedia.org/wiki/List_of_tz_database_time_zones - - -# Plugins (previously gems:) -plugins: - - jekyll-paginate - - jekyll-sitemap - - jekyll-gist - - jekyll-feed - - jemoji - - jekyll-include-cache - -# mimic GitHub Pages with --safe -whitelist: - - jekyll-paginate - - jekyll-sitemap - - jekyll-gist - - jekyll-feed - - jemoji - - jekyll-include-cache - - -# Archives -# Type -# - GitHub Pages compatible archive pages built with Liquid ~> type: liquid (default) -# - Jekyll Archives plugin archive pages ~> type: jekyll-archives -# Path (examples) -# - Archive page should exist at path when using Liquid method or you can -# expect broken links (especially with breadcrumbs enabled) -# -