
MiguelAfonsoCaetano
141.2K posts

MiguelAfonsoCaetano
@remixtures
Senior Technical Writer @ https://t.co/Ryejhm8bmU. PhD in Communication Sciences (ISCTE-IUL). Past: technology journalist, blogger & communication researcher.









Alma mater of Maryam Mirzakhani, the first woman to win the mathematics Fields Medal.

NEW: The United States sent guns to the Iranian protesters through the Kurds, President Trump told Fox News. "We sent guns to the protesters, a lot of them," President Trump told me. "And I think the Kurds took the guns."



🦔Researchers at the University of Pennsylvania studied what they call cognitive surrender, the tendency to accept AI outputs without critical evaluation. Across 1,372 participants and over 9,500 trials, subjects accepted faulty AI reasoning 73.2% of the time and only overruled it 19.7% of the time. When the AI was wrong, users still accepted its answer 80% of the time. Subjects who used AI scored 11.7% higher on confidence in their answers despite the AI being wrong half the time. Adding time pressure made people 12 percentage points less likely to catch AI errors. Adding financial incentives and immediate feedback made them 19 points more likely to catch them. My Take The time pressure finding matters enormously for how AI is actually being deployed in workplaces. Companies are using AI to justify faster turnaround times, which means employees are using it under exactly the conditions that make them least likely to catch mistakes. When you're rushed, your internal monitor for detecting errors essentially stops firing, so you get AI output, no time to review it, high confidence it's correct, and a meaningful chance it's wrong. People using a system that was wrong half the time still felt more confident in their answers than people who weren't using AI at all. That is a system actively making people worse at knowing what they don't know, which is one of the most dangerous things you can do to human judgment at scale. The companies pushing AI hardest into employee workflows should be reading this research carefully. Hedgie🤗 Link to research for those interested: papers.ssrn.com/sol3/papers.cf…


🦔LinkedIn has been injecting a JavaScript fingerprinting script into every page load that scans visitors' browsers for 6,236 installed Chrome extensions and collects hardware data including CPU core count, available memory, screen resolution, time zone, battery status, and storage capabilities. The script targets extensions from competing sales intelligence products like Apollo, Lusha, and ZoomInfo, along with over 200 other competing tools. Because LinkedIn accounts are tied to real names, employers, and job titles, the extension and device data can be linked back to identify specific individuals. LinkedIn says the scanning is used to detect extensions that scrape data in violation of its terms of service. My Take LinkedIn's explanation that this is about detecting scraping tools is technically plausible for some of the 6,236 extensions being scanned. It is less convincing for the grammar tools, tax professional software, and other categories with no obvious connection to data scraping that are also in the list. Scanning for 200 competing sales intelligence products specifically looks less like platform protection and more like competitive intelligence gathering on your own users. What I'd want people to understand is what the hardware fingerprinting actually means in practice. CPU count, memory, screen resolution, battery status, and timezone combined with a real name and employer creates a device profile that follows you across the web even if you log out. LinkedIn is a platform most people use because they feel professionally obligated to. That captive audience dynamic makes the aggressive data collection harder to push back against than it would be on a platform you could simply stop using. Hedgie🤗



Officials say hitting power plants and roadways is necessary to cripple Iran’s weapons programs. on.wsj.com/4dvdqAv



