Being Human in the Age of Black Box Algorithms and Subjective Truths

17

October

2019

5/5 (4)

esther-jiao-ADv0GiMBlmI-unsplash
Photo by Esther Jiao on Unsplash

Algorithms are everywhere and play an important role in our daily lives. They decide what we see on our social media feeds, which ads are used to target us and what route we should take to get places.

The problem is that many algorithms are black boxes. They are complex systems that shape our world, whose internal workings are hidden or not easily understood (Oxford English Dictionary Online, 2011). With these algorithms, which often have a complex design, it is unclear how the output or conclusions were reached. With historically little oversight or accountability regarding their design, this problem has a profound effect on society as our day-to-day lives and our personal decisions are increasingly controlled by algorithms (Carey, 2018; Illing, 2018). Most of us have no idea what algorithms are or how exactly we are being influenced by them. And how could we if we cannot look inside, ‘under the hood’? And if we could, if sometimes even the coders that built an algorithm do not know how the system reached its conclusion (Carey, 2018), how should we?

Does this mean that we cannot trust algorithms anymore? Hannah Fry, an Associate Professor in Mathematics at University College London and author of the book “Hello World: Being Human in the Age of Algorithms”, explains in an interview with Sean Illing that our behaviour to algorithms tends to be in extremes (Illing, 2018). On the one hand, we have very high expectations of algorithms and will trust them blindly. On the other hand, as soon as we see that an algorithm or the outcomes are somewhat inaccurate, we do no longer trust them and disregard them. Fry thinks the right attitude is somewhere in the middle: “we should not blindly trust algorithms, but we also should not dismiss them altogether” (Illing, 2018).

Subjective Truths
A larger concern with algorithms is that they often contain the biases of the people who create them and that they reinforce biases and stereotypes we may inherently have, but might now be aware of (Li, 2019). As Bill and Melinda Gates (2019) describe this can even be the result of non-existent or sexist data. This is especially dangerous with black-box algorithms, which do not explain their results to their programmers – let alone to the end-users.

And what if information is deliberately misrepresented or differs depending on who you are or where you are from? Take for example Google Maps. Google claims to be objective in marking disputed regions in various parts of the world (Boorstin, 2009). Depending on from what country you access Google Maps, you will see Crimea portrayed as part of Ukraine or Russia (Usborne, 2016). If you consider that at least 124 countries are involved in a territorial dispute, there is a lot of potential for subjective truths (Galka, n.d.; Metrocosm, 2015). Another example is Apple. If you are in Hong Kong or Macau, from iOS 13.1.1 onwards you will no longer find the Taiwanese flag ?? on the emoji keyboard (Peters & Statt, 2019). Generally, as an user, you are not made aware of these intentional differences, but they do shape our perception of reality.

Conclusion
When it comes to algorithms, the people behind them or really anything in life, you should not blindly trust the information that is presented to you. Besides, as Fry argues, we should not think of algorithms themselves as either good or bad, but we should rather focus on the people behind the scenes that create these algorithms (Illing, 2018). Although algorithms may not be perfect and they often are biased, they still are extremely effective and have made our lives easier.

Whereas endings are is inevitable, the direction of technological progress is not. We have to ensure that technological progress remains aligned with human’s best interests. There might be unintended or undesired consequences, but as French philosopher Paul Virilio said:

“When you invent the ship, you also invent the shipwreck; when you invent the plane you also invent the plane crash; and when you invent electricity, you invent electrocution…Every technology carries its own negativity, which is invented at the same time as technical progress.” (Virilio, Petit & Lotringer, 1999).

 

References:
Black box. (2011). In Oxford English Dictionary Online. Retrieved 12 October 2019, from https://www-oed-com.eur.idm.oclc.org/view/Entry/282116
Boorstin, B. (2009, December 4). When sources disagree: borders and place names in Google Earth and Maps. Retrieved from https://publicpolicy.googleblog.com/2009/12/when-sources-disagree-borders-and-place.html
Carey, S. (2018). How IBM is leading the fight against black box algorithms. Retrieved 16 October 2019, from https://www.computerworld.com/article/3427845/how-ibm-is-leading-the-fight-against-black-box-algorithms.html
Gates, B. & Gates, M. (2019, February 12). Our 2019 Annual Letter. Retrieved from https://www.gatesnotes.com/2019-Annual-Letter#ALChapter4
Galka, M. (n.d.). Every Disputed Territory in the World [Interactive Map]. Retrieved 16 October 2019, from http://metrocosm.com/disputed-territories-map.html
Illing, S. (2018, October 1). How algorithms are controlling your life. Retrieved from https://www.vox.com/technology/2018/10/1/17882340/how-algorithms-control-your-life-hannah-fry
Li, M. (2019, May 13). Addressing the Biases Plaguing Algorithms. Retrieved from https://hbr.org/2019/05/addressing-the-biases-plaguing-algorithms
Metrocosm. (2015, November 20). Mapping Every Disputed Territory in the World. Retrieved from http://metrocosm.com/mapping-every-disputed-territory-in-the-world/
Peters, J., & Statt, N. (2019, October 7). Apple is hiding Taiwain’s flag emoji if you’re in Hong Kong or Macau. Retrieved from https://www.theverge.com/2019/10/7/20903613/apple-hiding-taiwan-flag-emoji-hong-kong-macau-china
Usborne, S. (2016, Augustus 10). Disputed territories: where Google Maps draws the line. Retrieved from https://www.theguardian.com/technology/shortcuts/2016/aug/10/google-maps-disputed-territories-palestineishere
Virilio, P., Petit, P., & Lotringer, S. (1999). Politics of the very worst. New York: Semiotext(e).

Please rate this

5 Essential Tips to Protect Your Privacy and Data Online

5

October

2019

5/5 (10)


Photo by Arvin Keynes on Unsplash

The likelihood of a hacker specifically targeting you may be small. However, it is possible. And even if you were not the target, you may become a victim anyway. Luckily for you, it really is not difficult to protect yourself. In this blog post, I am sharing 5 essential tips that will help you to protect your privacy and data online and make a hacker’s life harder.

1: Use Up-to-date Software and a Virus Scanner
The easiest and most important way to protect yourself is to make sure that you use up-to-date software. Hackers are often successful because they exploit vulnerabilities that are fixed in software updates. Check regularly if there are new updates available for your devices, install them as soon as possible and enable automatic updates when possible.

If your device no longer receives updates, you should consider buying a new device as your current device will become more vulnerable to security risks and viruses.

In addition, a virus scanner is recommended. Even though most infections happen on Windows computers, it is also recommended if you are using a Mac. It is worth it to pay for a virus scanner as the paid versions often include additional protection. Good options are Kaspersky Anti-Virus, ESET and F-Secure Anti-Virus. Keep in mind that there are often student discounts available*. And if you cannot afford a paid version, you can install the free version of AVG.

2: Use Complex Passwords and Password Managers
Almost every app or website requires you to create an account with a password. Although using one password for multiple accounts helps you remember your passwords, it is not very safe. A hacker should not be able to access your bank account or mailbox with your Facebook or Netflix password.

If you do not use the same password twice, chances are that your passwords are not as complicated as they should be. You are not alone. The internet security firm SplashData publishes an annual list of the 25 most common passwords, which are based on millions of leaked passwords. Since 2013, the most common password was “123456”, followed by “password”.

Fortunately, there is a solution: password managers. A password manager is a digital vault that keeps your passwords safe. The app can quickly create a very strong and complicated password such as “XHu#Qu*D9*j^0NU2K3p#Hs”. The best thing? You will only need to remember one password to access all your passwords. Just make sure you do not forget this password, or you will lose access to your vault. If you worry that this might happen to you, write this password down and keep it in a safe offline place.

Good password managers are 1Password (paid: starting from €3.21 per month, 1 month free trial**) and LastPass (free / paid: starting from €2.67/month, 6 months free Premium for students). Both password managers offer a free trial of their premium version, which is a nice way to try them out. As soon as you are convinced to use a password manager, strongly consider the paid version as this includes two-factor authentication and allows you to store your data on EU servers only***.

3: Check for Stolen Passwords
Even if you have very strong passwords, they could still get stolen by hackers. That is why it is important to regularly check if one of your accounts or passwords is compromised. The website Have I Been Pwned, a project of Troy Hunt, keeps track of hacked websites and data breaches and informs you when your email was found in one of the data breaches. Simply enter your email address and check if you have an account that has been compromised in a data breach. If so, immediately change your passwords of all accounts that use the compromised password. Furthermore, sign up for the free Have I Been Pwned notification service and get notified in the future when one of your accounts is compromised.

If you have not used Have I Been Pwned before, let me know in the comments how many times your passwords were found.

4: Turn on Two-Factor Authentication
Turn on two-factor authentication (2FA). It will limit the impact of a stolen password. How does it work? After entering your username and password, you will be asked to complete a second step. Generally, you are asked to enter a code that is sent to your smartphone via a text message, voice call or an authentication app. For most people, receiving the code via a text message is enough. However, it is even safer to use an authenticator app.

With two-factor authentication, even if your password is stolen, a hacker would also need the additional code that is sent to your phone. Although you may think it feels a bit inconvenient at times, two-factor authentication makes it unlikely that someone can access your account. Popular services that support two-factor authentication include Apple, Google, Facebook, Instagram, WhatsApp, Twitter and Dropbox. A longer list can be found here.

5: Cover Your Webcam and Be Aware of Your Surroundings
As Co-Founder of CamHatch, I really cannot stress this enough: cover your webcam. Hackers can spy on you using your webcam. A simple post-it or sticker should be enough to prevent intimate photos or videos of you appearing online. If you want a more elegant and convenient solution, consider a webcam cover such as the CamHatch webcam cover.

Furthermore, be aware of your surroundings. If you are on the phone, can anyone hear any personal information such as your date of birth or address? If you are using your smartphone, tablet or laptop in a public space, such as a library or on a train, can anyone see the information on your screen or what you are typing?

Great Sources for More Information
Great sources that were used for this article and that I can recommend if you want to learn more are:
Laat Je Niet Hack Maken (NL) / Watch Your Hack (EN) by Daniel Verlaan
Internetvrijheid Toolbox (NL) by Bits of Freedom
Have I Been Pwned by Troy Hunt

Do you have any questions, comments or suggestions? Let me know in the comments below!

Footnotes
* As a student in the Netherlands, SURFspot is a great not-for-profit ICT online store that offers special educational discounts. If you are studying outside the Netherlands, try looking online for student discounts.
** You can sign up for a free 30 day trial at 1password.eu.
*** I strongly recommend choosing to store your data on EU servers if you are from the EU:
• LastPass: Go to lastpass.eu/use_eu.php after creating your account.
• 1Password: 1Password does this automatically if you create an account on their European website.

Please rate this