Connect with us

SOCIAL

Twitter’s open-source algorithm: Is transparency the best policy?

Published

on

Twitter has accepted a $44 billion bid from Elon Musk to acquire the company

Twitter has accepted a $44 billion bid from Elon Musk to acquire the company – Copyright GETTY IMAGES NORTH AMERICA/AFP SCOTT OLSON

The recent announcement that Elon Musk purchased Twitter for $44 billion has created nervousness among many, especially over the return of questionable political groups to the micro-blogging platform.

In addition, experts have been speculating about the impact his ownership would have on the social media service.

While Musk has proposed many changes, many in the cybersecurity community have critiqued his desire to make Twitter’s algorithm open-source. In particular, media analysts have pointed out that this could invite malicious actors to “game” the algorithm and make Twitter a target for more intense cyber-attacks.

Looking into the matter for Digital Journal is Cybersecurity expert Derek E. Brink, Vice President & Research Fellow at Aberdeen Strategy & Research.

Brink is not adopting the same line as other cybersecurity commentariat, noting: “The idea that algorithms should be open and transparent has been considered best practice for nearly 140 years. It’s called Kerkhof’s Principle, which holds that trying to keep the algorithms secret — which many refer to as “security by obscurity” — is the wrong approach to maintaining security.”

The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowledge. It follows, the fewer and simpler the secrets that one must keep to ensure system security, the easier it is to maintain system security.

Advertisement

Alternatively, Brink states: “Instead, the algorithms themselves should be public knowledge — or as put by Shannon’s Maxim (another version of the same principle), we should operate under the assumption that “the enemy knows the system.”

This means: “In cybersecurity, openness and transparency has consistently led to algorithms that are better and more secure, not less.”

Addressing those who are taking a different line, Brink says: “For those who raise the concern that an open, transparent algorithm might be “gamed” to provide some advantage — can we not say the same thing about “closed” algorithms? Everyday examples are abundant, for example: how to make your web pages more likely to be found by search engines; how to raise your credit score; how to minimize the likelihood of an IRS audit on your tax return; how to improve your candidacy on job search sites; and how to optimize your personal profile for dating sites, to name just a few.”

Returning to his theme, Brink reiterates: “Openness and transparency about how these algorithms work is the best way to prevent discrimination and corruption – or, as [U.S.] Supreme Court Justice Louis Brandeis put it, ‘sunlight is the best disinfectant’”.

Source link

SOCIAL

30 Days of Content Prompts [Infographic]

Published

on

30 Days of Content Prompts [Infographic]

Are you looking for ways to liven up your business’ social media feed? Want to share a good mix of content to help you stand out from the crowd, and better engage your target audience?

The below infographic from Sonrisa Studio will help.

Here, the Sonrisa team has outlined 30 content prompts, one for each day of the average month, which could help to get you out of a content slump, or provide you with another spark to get the ideas flowing.

Each of these prompts can also help spark ongoing conversation, which is key to maximizing algorithmic performance.

Worth keeping on file as a reference.

A version of this post was first published on the Red Website Design blog.

Source link

Advertisement
Continue Reading

DON'T MISS ANY IMPORTANT NEWS!
Subscribe To our Newsletter
We promise not to spam you. Unsubscribe at any time.
Invalid email address

Trending

en_USEnglish