Algorithms Are Coming for Democracy—but It’s Not All Bad

Read Time:3 Minute, 37 Second

In 2025, AI is poised to change every aspect of democratic politics—but it won’t necessarily be for the worse.

India’s prime minister, Narendra Modi, has used AI to translate his speeches for his multilingual electorate in real time, demonstrating how AI can help diverse democracies to be more inclusive. AI avatars were used by presidential candidates in South Korea in electioneering, enabling them to provide answers to thousands of voters’ questions simultaneously. We are also starting to see AI tools aid fundraising and get-out-the-vote efforts. AI techniques are starting to augment more traditional polling methods, helping campaigns get cheaper and faster data. And congressional candidates have started using AI robocallers to engage voters on issues. In 2025, these trends will continue. AI doesn’t need to be superior to human experts to augment the labor of an overworked canvasser, or to write ad copy similar to that of a junior campaign staffer or volunteer. Politics is competitive, and any technology that can bestow an advantage, or even just garner attention, will be used.

Most politics is local, and AI tools promise to make democracy more equitable. The typical candidate has few resources, so the choice may be between getting help from AI tools or getting no help at all. In 2024, a US presidential candidate with virtually zero name recognition, Jason Palmer, beat Joe Biden in a very small electorate, the American Samoan primary, by using AI-generated messaging and an online AI avatar.

At the national level, AI tools are more likely to make the already powerful even more powerful. Human + AI generally beats AI only: The more human talent you have, the more you can effectively make use of AI assistance. The richest campaigns will not put AIs in charge, but they will race to exploit AI where it can give them an advantage.

But while the promise of AI assistance will drive adoption, the risks are considerable. When computers get involved in any process, that process changes. Scalable automation, for example, can transform political advertising from one-size-fits-all into personalized demagoguing—candidates can tell each of us what they think we want to hear. Introducing new dependencies can also lead to brittleness: Exploiting gains from automation can mean dropping human oversight, and chaos results when critical computer systems go down.

Politics is adversarial. Any time AI is used by one candidate or party, it invites hacking by those associated with their opponents, perhaps to modify their behavior, eavesdrop on their output, or to simply shut them down. The kinds of disinformation weaponized by entities like Russia on social media will be increasingly targeted toward machines, too.

AI is different from traditional computer systems in that it tries to encode common sense and judgment that goes beyond simple rules; yet humans have no single ethical system, or even a single definition of fairness. We will see AI systems optimized for different parties and ideologies; for one faction not to trust the AIs of a rival faction; for everyone to have a healthy suspicion of corporate for-profit AI systems with hidden biases.

This is just the beginning of a trend that will spread through democracies around the world, and probably accelerate, for years to come. Everyone, especially AI skeptics and those concerned about its potential to exacerbate bias and discrimination, should recognize that AI is coming for every aspect of democracy. The transformations won’t come from the top down; they will come from the bottom up. Politicians and campaigns will start using AI tools when they are useful. So will lawyers, and political advocacy groups. Judges will use AI to help draft their decisions because it will save time. News organizations will use AI because it will justify budget cuts. Bureaucracies and regulators will add AI to their already algorithmic systems for determining all sorts of benefits and penalties.

Whether this results in a better democracy, or a more just world, remains to be seen. Keep watching how those in power uses these tools, and also how they empower the currently powerless. Those of us who are constituents of democracies should advocate tirelessly to ensure that we use AI systems to better democratize democracy, and not to further its worst tendencies.

This essay was written with Nathan Sanders, and originally appeared in Wired.

Read More

Microsoft Warbird and PMP security research – technical doc

Read Time:21 Second

Posted by Security Explorations on Dec 03

Hello All,

We have released a technical document pertaining to our Warbird / PMP security
research. It is available for download from this location:

https://security-explorations.com/materials/wbpmp_doc.md.txt

The document provides a more in-depth technical explanation, illustration and
verification of discovered attacks affecting PlayReady on Windows 10 / 11 x64
and pertaining to the following in particular:
– Warbird deficiencies
– content…

Read More

Best Ways to Reduce Your Digital Footprint Now

Read Time:6 Minute, 2 Second

Every activity you perform online, whether it is commenting on a news article, sharing something on social media or your shopping preferences leaves a digital footprint. This digital trail helps organizations find more about you. And while it does offer a certain degree of convenience, it can be a real hazard to your online privacy. Fortunately, there are several ways you can use to reduce your digital footprint and help ensure your privacy.

Understanding Your Digital Footprint

A digital footprint is a trail of data a person leaves online while using the internet. This data includes your search history, photos and videos you might have uploaded, newsletter subscriptions and more. 

Also known as the ‘digital shadow,’ your footprint data can help paint a picture of who you are. Therefore, most apps, websites and online marketers use your digital footprint to personalize your browsing experience. However, your online footprint can also wreck your online privacy in several ways and is one of the common causes of data breaches.

Since almost every action is recorded online, the record that forms a footprint is unique to every user. The type of footprint depends on how it is left or collected. There are two main types of digital footprints:

Active Digital Footprint
An active digital footprint is the data you intentionally leave online or rather the things you actively do online. This includes your online posts, comments, online shopping or even signing up for a newsletter. All these things are parts of your active digital footprint.
 
Passive Digital Footprint
A passive digital footprint is the data you share unintentionally. This data usually depends on the cookies that a website is using whenever you visit it. Using cookies, a website may track how many times you have visited it, your biometric and geolocation data and even your IP address.

Both active and passive digital footprints can be tracked and stored by multiple sources. If you are curious about how to check your digital footprint, consider these four main methods: search your name on popular search engines like Google and Yahoo, use digital footprint checkers, check your public accounts and also look for data breaches through breach detection services.

Does My Digital Footprint Disrupt My Online Privacy? Can I Delete It?

A digital footprint is permanent, and deleting it is next to impossible. Once your data is public, you have little control over how others use it. All the information left behind due to your online activities is used and stored by third-party services, your services providers or the government.

However, one of the most dangerous aspects of an online footprint is that you never know how big it is. Since every app and site collects, stores and shares bits of your information, there is no way to completely track and eliminate all that information. This means that even the parts of your life you would want to keep private such as your medical information can be revealed online through your online orders or search history. Here are some ways your online footprint disrupts your privacy:

Information is valuable to cybercriminals, who can exploit your digital footprint. They can gather enough relevant information to commit identity theft, phishing, cyberbullying and bank scams.
You receive more spam emails and phone calls. Since your information is shared publicly and with third parties, it is one of the reasons you receive spam emails.
Potential employers may gain access to outdated and unwanted information and reject you on that basis. According to a study, seven out of ten employers run an employee background check on social media platforms and have rejected 57% of people based on information found on social media platforms.
Your footprint can also reveal your religious and political affiliations. While this may not seem like a dire issue, for someone who travels frequently or is suddenly under authoritarian rules, this could often lead to unforeseen arrests or biases made in workplaces.

The availability of your digital footprint for anyone to exploit is a dangerous matter, specifically in a world that relies significantly on digitization and the internet. And while there is no way to completely erase it, there are ways to minimize and protect it.

Best Ways to Reduce Your Digital Footprint

There are several ways you can reduce and protect your digital footprint, depending on how safe you want to be. However, with most of your information available out there, here is the damage control you can do:

Check Your Privacy Settings

Your privacy settings allow you to control who can see your posts and who can’t. Make sure to go through your privacy settings on all of your social media platforms and adjust them accordingly. This can help you ensure that you are sharing your personal data with the people you trust. For sites that don’t have the option to change your privacy settings you can always contact them to have the information you want removed.

Try to Gain Back Control of Your Data

Data brokers are one of the largest collectors of your digital footprint. They collect your information and later sell it to scammers, the government or even insurance companies. However, data brokers are required by law to remove the user’s data from their databases if the owner issues a request. Most users seek the help of data broker removal services who contact data brokers on their behalf and issue requests to have their data removed. While this method is costly, if chosen the right service, it can effectively help reduce your digital footprint significantly.

Delete Old Accounts

Deleting old accounts that are no longer in use is an effective way to minimize your digital footprint. It gives you more control over the data you share with third parties. By deleting old accounts, you can effectively remove outdated and unwanted information, preventing third-parties from prying into your childhood or personal life.

Stay Cautious on Public Wi-Fi

Public Wi-Fi is a cybercriminal’s playground and you can never be sure how secure it is and who might have access to the data you are sending over it. Therefore, it is crucial to stay particularly mindful of public Wi-Fis and avoid sharing personal information over them, or logging into your banks, email accounts or social media accounts.

Use a VPN

VPNs are online privacy and security tools that hide your data by encrypting and further transport it from your computer to your destination in encrypted packets within an encrypted tunnel. Additionally, it also routes your data traffic through remote servers which helps mask your IP address. This prevents websites from tracking you or collecting your IP address and your geo-location.

Final Words

Reducing your digital footprint is important for protecting your privacy and security. However, to completely avoid it you will have to stop using the internet completely which is next to impossible. Therefore, the next best thing is to remember why it is crucial to hide it and look for effective methods to reduce it. If you search for yourself online, will you be satisfied with the information you find? This is a question you need to answer yourself and try to secure your personal information as much as you can.  

Read More

ZDI-24-1641: Intel Computing Improvement Program PyInstaller Local Privilege Escalation Vulnerability

Read Time:17 Second

This vulnerability allows local attackers to escalate privileges on affected installations of Intel Computing Improvement Program. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-49797.

Read More