CyberSemantics Profile Banner
Josh Kenway Profile
Josh Kenway

@CyberSemantics

Followers
78
Following
295
Media
0
Statuses
40

Tech + security policy. Currently @PayPal. Previously @AJLUnited @CyberAlliance. Alum @StanfordCyber @Universityofga. He/him.

United States
Joined May 2021
Don't wanna be here? Send us removal request.
@camillefrancois
Camille François
4 years
Re-upping this appreciation tweet from a few weeks back, when Twitter took the time to share 10 years of hard learned lessons with my new & growing team 💙 So many of us in the field share profound admiration and solidarity with the Twitter Trust & Safety teams. cc @tspainfo
@camillefrancois
Camille François
4 years
Hosted a fireside chat with @yoyoel this week, about the evolution of the Trust & Safety field over the last decade, and lessons learned along the way. This is an appreciation tweet for Yoel's extraordinary insights, thoughtful perspectives & true generosity in sharing it all❣️
0
3
12
@ericgeller
Eric Geller
4 years
We're heading to a very ugly place. https://t.co/A5ZAM1moNU
414
4K
13K
@brianbeutler
Brian Beutler
4 years
People were excited about this idea after five years of Trump madness, but in practice it amounts to ceding the information environment to right-wing propagandists and nihilist centrist commentators who work hand in glove to drive your approval into the mid 30s amid a jobs boom.
19
140
1K
@rajiinio
Deb Raji
4 years
So excited to read this! The co-option of the word "safety" in AI/ML spaces has been going on for way too long. Safety is an engineering design consideration that actually has a very specific *socio-technical* meaning, and definitely no direct connection to existential risk.
@roeldobbe
Roel Dobbe @[email protected]
4 years
📢📢 Excited to share new work! A chapter for the forthcoming Oxford Handbook on AI Governance. I cover insights from the history of the *system safety* field, which studies safety in socio-technical systems subject to software-based automation. [1/25] https://t.co/V6dvapfxJD
3
15
103
@NaheedD
Naheed Dosani
4 years
Wanna know the only difference between you & a refugee? Luck.
365
10K
56K
@vermontgmg
Garrett M. Graff
4 years
One thing worth keeping in my mind today: There’s a straight line from Russia’s attack on the US election in 2016 to 1/6 to today’s new invasion of Ukraine. The chaos that Russia unleashed with the election of Trump weakened us to the point Putin feels confident invading Europe.
6K
8K
34K
@ElizabAdams
Elizabeth Adams 🌱🚲🚇✊
4 years
I’m not going to share the graphic video of the Brooklyn neighbor being hit by multiple reckless drivers. But i will share this photo as a reminder of the increasing blind spots of ever-growing vehicles and fact that we have failed to make the safe street design changes we need.
37
395
2K
@camillefrancois
Camille François
4 years
🆕 📖 Here is a short 🧵 about my latest publication, a research report published with @AJUnited looking at the applicability of bug bounties to the discovery and redress of algorithmic harms! https://t.co/045x6DhASj
@AJLUnited
Algorithmic Justice League
4 years
📢AJL News Release: The Algorithmic Justice League Releases Groundbreaking Report; Offers Roadmap to Adapt ‘Bug Bounty’ Programs to Combat Algorithmic Harm. Read about the #BugBounty Report here: https://t.co/6A0t9fNs36
2
22
31
@rajiinio
Deb Raji
4 years
Bug bounties have a lot of potential - to incentivize investigations, build audit communities, formalize harm taxonomies & more! @AJLUnited interviewed folks from the bug bounty space and did a thorough lit review to break down what we could learn: https://t.co/lRw9Jt70rY
1
28
112
@CyberSemantics
Josh Kenway
4 years
And join @camillefrancois and I next Friday (Feb 2) as we discuss with key findings about #BugBounties with fellow nerds @ystvns @_Ryan_Ellis 🤓 at @ColumbiaSIPA Register here:
0
1
3
@CyberSemantics
Josh Kenway
4 years
Our @AJLUnited team dug *deep* into the concept of #BugBounties for #AI harms Take a gander for a combo of constructive and cautionary lessons – not only for this emerging domain but for current practices in infosec as well…
@schock
Sasha Costanza-Chock
4 years
I'm so proud to be part of the team at @AJLUnited that produced this report on how we might use bug bounty programs (BBPs) to increase algorithmic accountability & decrease algorithmic harms: https://t.co/PVuko0izqJ w/ @camillefrancois @CyberSemantics @rajiinio @jovialjoy
1
3
10
@schock
Sasha Costanza-Chock
4 years
Crypto colonizers displacing Puerto Ricans, buying up the island with tax evasion money while launching ponzi recruitment schemes.
Tweet card summary image
washingtonpost.com
A new wave of wealthy investors is moving to the island. This time they say the locals can get rich too.
7
127
255
@runasand
Runa Sandvik
4 years
If the union busting by @nytimes and @BuzzFeed was done by companies in Silicon Valley, it’d be front page news. Something to think about.
0
6
49
@teddygoff
Teddy Goff
4 years
It’s a “back-and-forth” in that one member of Congress called another member of Congress a terrorist on account of her race and her faith. And the “jarring turn” is death threats against that member of Congress. Come on.
16
374
3K
@nytopinion
New York Times Opinion
4 years
When Maya Guzdar, an intern at the Pentagon, was harassed, the response was "the best-case scenario," she writes: Higher-ups took immediate action. Still, "it’s scary to realize the fragility of my story’s positive outcome." 
Tweet card summary image
nytimes.com
When I arrived at the office, the reality that awaited me was the one I’d never imagined: the best-case scenario.
2
13
30
@runasand
Runa Sandvik
4 years
Apple said security researchers could verify its claims about the child safety feature. So they did. These two images generate the same hash. https://t.co/lO8BEbWr89
6
192
480
@random_walker
Arvind Narayanan
4 years
There’s a much-needed and active line of work on mitigating ML dataset harms. The main implication of our findings for this work is the difficulty of anticipating ethical impacts at dataset creation time. We advocate that datasets should be “stewarded” throughout their lifecycle.
1
9
40
@jackhcable
Jack Cable
4 years
Kudos to @CISAgov @CyberGovAU @NCSC @FBI for pushing this out. A large percent of attacks start with just a few known vulnerabilities.
@CISACyber
CISA Cyber
4 years
❗️ Check out the Top Routinely Exploited Vulnerabilities of 2020 & 2021, according to @CISAgov, @CyberGovAU, @NCSC, and @FBI! Visit https://t.co/XRMVeaKMgH to review the #CVEs and help reduce your organization’s risks. #Cybersecurity #RiskManagement #TTPs #IOCs #CyberResilience
0
11
26