Any data, prompts, or requests you share helps teach the algorithm—and personalized information helps fine tune it further, says Jake Moore, global cybersecurity adviser at security outfit ESET, who created his own action figure to demonstrate the privacy risks of the trend on LinkedIn. Uncanny Likeness In some markets, your …
Read More »AI Is Using Your Likes to Get Inside Your Head
What is the future of the like button in the age of artificial intelligence? Max Levchin—the PayPal cofounder and Affirm CEO—sees a new and hugely valuable role for liking data to train AI to arrive at conclusions more in line with those a human decisionmaker would make. It’s a well-known …
Read More »The Meta Trial Shows the Dangers of Selling Out
Meta has a lot at stake in the current FTC lawsuit against it. In theory a negative verdict could result in a company breakup. But CEO Mark Zuckerberg once faced an even bigger existential threat. Back in 2006, his investors and even his employees were pressuring him to sell his …
Read More »How to Use Instagram Edits, Meta’s New CapCut Clone for Editing Videos
In January, Meta announced its stand-alone video editing app for making Reels, simply called Edits. After release delays, users anywhere in the world can now download the app and try it out. The new video-creation tool is clearly inspired by the success of ByteDance’s similar CapCut app for TikTok, with …
Read More »4chan Is Dead. Its Toxic Legacy Is Everywhere
Many of the 4chan users that called me mid-Battletoad attack left messages. I listened to all of them. A pattern quickly emerged: young men, clearly nervous to even leave a message, trying to harass a stranger for, seemingly, the hell of it. Those voicemails have never left me in the …
Read More »Bluesky Is Rolling Out Official Verification
Starting today, Bluesky is rolling out a new verification system, complete with the familiar blue check marks popularized by Twitter. The social platform, which has experienced rapid growth since it opened to the public in early 2024, formerly relied on an unconventional self-verification system where users could “authenticate” themselves by …
Read More »