Sebastian Thrun, The new generation of computers is programming itself
Some very good courses are online and many are free of charge.
deeplearning.ai by Andrew Ng on Coursera. You have to pay for this course. But you can access the videos by selecting Enrol and then Audit. Coursera has other Machine learning courses for free.
“When you grow up you, tend to get told that the world is the way it is and your life is just to live your life inside the world, try not to bash into the walls too much, try to have a nice family, have fun, save a little money. That’s a very limited life. Life can be much broader, once you discover one simple fact, and that is that everything around you that you call life was made up by people that were no smarter than you. And you can change it, you can influence it, you can build your own things that other people can use. And the minute that you understand that you can poke life and actually something will, you know if you push in, something will pop out the other side, that you can change it, you can mold it. That’s maybe the most important thing. It’s to shake off this erroneous notion that life is there and you’re just gonna live in it, versus embrace it, change it, improve it, make your mark upon it. I think that’s very important and however you learn that, once you learn it, you’ll want to change life and make it better, cause it’s kind of messed up, in a lot of ways. Once you learn that, you’ll never be the same again.”
If you are interested in testing and trying object recognition with TensorFlow, I recommend this Medium post:
I tried it and it works quite well and the available source code allows you to learn how this all works.
You should also read Dat Tran follow up post, that shows how to train the NN with your own images, to identify new objects.
A new book by Kevin Mitnick is out, The Art of Invisibility. A good read on how to protect our information and privacy online.
I am going to list the tools and software mentioned on that the book:
Elcomsoft Phone Password Breaker: is intended to enable law enforcement and government agencies to access iCloud accounts.
iBrute: a password-hacking mechanism specifically designed for acquiring iCloud credentials from just about anyone.
oclHashcat: a password cracking tool that leverages GPU for high speed cracking
John the Ripper: password cracker
www.haveibeenpwned.com: to see if your account has been compromised in the past
Password Safe: passwords manager
KeepPass: passwords manager
EFF HTTPS Everywhere
DuckDuckGo private search engine
startpage.com private search engine
Geo Location check: http://benwerd.com/lab/geo.php
https://panopticl check your browser signature
NoScript Firefox defense against third party tracking
ScriptBlock for Chrome
CanvasBlocker for Firefox
CanvasFingerPrintBlock for Chrome
Facebook Disconnect for Chrome
Facebook Privacy List for Adblock Plus for Firefox and Chrome
http://www.piriform.com CCleaner android/iOs/PC/Mac
Experian and Axiom: companies gathering info about us
aircrack-ng: can reveal the authorized MAC address of currently connected users to a WiFi router.
Reaver: can crack a WPS-enabled router within several hours
Cryptowall: it encrypts your entire hard drive, locking you out of every file until you pay the attacker
make sure the service includes PFS (perfect forward secrecy), that does not block Tor and does not log the connections
Tails and Tor
BitLocker Disk encryption in Windows
PGP Whole Disk Encryption Disk encryption
WinMagic disk encryption for Windows
FileVault 2 Apple disk encryption
VeryCrypt Disk encryption
SpiderOak encrypted cloud storage
Keyboard Privacy Chrome browser plugin
Shodan IoT devices
syncstop.com a USB condom which allows you to safely plug into any USB charger or computer
Tumblers services that take Bitcoin from a variety of sources and mix or tumble them together so that the resulting Bitcoin retains its value but carries traces of many owners.
Vanilla Visa and Vanilla MasterCard gift cards, viabuy.com in Europe
Paxful.com bitcoin wallet site. Using Tor, you can setup an initial Bitcoin wallet.
Other links/apps not on the book but important to know
VPN: Freedome by F-secure
Processing power has increased, data storage is increasingly cheap and algorithms to analyze that makes sense of all the data exist and are continuously refined.
Smartphones, camera and other devices are connected to the Internet (defined ioT Internet of Things) and continuously capture data. Websites track our interactions and preferences, what we like and do not like; who we interact with and who are our friends. Google, Facebook and other services know where we live, where we work, the road we take and many other things.
In most cases, aware or not, we give this information for free in return for the services. These service monetizes our personal information by showing us ads or selling our info to other third party that will aggregate it and make sure they can make money out of it.
Our info is analyzed not only for commercial reasons, but also by governments that intercept and analyze Internet traffic and more.
A couple of examples:
Are you heading toward a big brother scenario? Is there a way to defend ourselves?
Machine learning is the ability to learn and make predictions using data. Data are the input and the output. A diverse set of skills set are required for manipulating large amount of data, defining the problem and the outcome, an understanding of the algorithms and an understanding of a lot of maths and statistics. Overall, machine learning is a complex task that requires advanced knowledge of different and complex subjects.
Fortunately a set of services are available that abstract the level of competencies required and they support data scientists and analysts in their tasks. At the end, what we really want is to make sense of our data and be able to make predictions about them.
The level of abstraction is important and allows the creation of more advanced services on top of machine learning cloud platforms.
Below a list of some of the most well known services in this space:
Google Cloud Machine Learning
Big data and predictive models are currently used and are going to be pervasive affecting our lives. There are many positive news coming from these new algorithms and techniques. At the same time, it is important to be aware of their impact, biases and how to deal with the imperfections and abuses that inevitable will come with them.
Weapons of Math Destruction by Cathy O’Neil is an extremely good and important book on this subject and I highly recommend it to all the people that want to understand how society is and will be affected by all these new algorithms and predictive models.