If you want to hear about the results of this research collaboration, or
have additional questions about the data collection approach or the
analysis, I invite you to come and join us at our upcoming showcase on
*Wednesday
11/16. *
On Tue, Nov 8, 2016 at 9:10 AM, James Salsman wrote:
> I assumed that when an affiliated researcher apart from Foundation
> staff says, "we have the complete server logs for Wikipedia,"
> amounting to 17 terabytes per month, that means they possess the
> information. I am
Dario,
I assumed that when an affiliated researcher apart from Foundation
staff says, "we have the complete server logs for Wikipedia,"
amounting to 17 terabytes per month, that means they possess the
information. I am glad to be wrong about that, but I object to the
implication that such an
Hi James,
> If this does not imply that the logs are copied from Foundation servers,
that is certainly advantageous over the apparent meaning of the language
used.
I am saddened to see that – instead of asking (legitimate) questions to
clarify how data is collected and shared – you are assuming
James Salsman wrote:
>
> If this does not imply that the logs are copied from Foundation
> servers, that is certainly advantageous over the apparent meaning
> of the language used.
Reading the links you provided, and Robert West's acknowledgements which
you did not link to, the above strikes me
Leila Zia wrote:
>... we are not aware of any reader logs being shipped out of the
> WMF servers.
Page 20 of http://infolab.stanford.edu/~west1/pubs/West_Dissertation-2016.pdf
says, "We have access to Wikimedia’s full server logs, containing all
HTTP requests to Wikimedia projects." Page 19
Having looked at this situation further, I am glad to say that I did not
find any information in Victoria's background that I considered to be a red
flag.
However, I would appreciate hearing more from Victoria about her
involvement in "Total Information Awareness" [0] and similar programs, past
Hi James,
On Thu, Nov 3, 2016 at 10:22 AM, James Salsman wrote:
> The Foundation's main security problem at present is that all of the
> reader logs with IP addresses get shipped off to a lab at Stanford
> which is under NDA,
>
Please create a task in phabricator for this
On Thu, Nov 3, 2016 at 10:19 PM, James Salsman wrote:
>
> Also I would like to know what "Orwellian philosophy" is
> http://link.springer.com/article/10.1007%2FBF01211002
From the paper (you can find download links with minimal effort): "*George
Orwell tells us of a language
James, thanks for bringing up that NYTimes article. Having taken a quick
look at it, it does raise some concerns but I would consider it a matter
worthy of further inquiry rather than a red flag. In Wikimedia we have our
own issues with trying to have an "open society" type atmosphere while
] On Behalf Of
James Salsman
Sent: Friday, 04 November 2016 7:19 AM
To: Wikimedia Mailing List
Subject: Re: [Wikimedia-l] DEITYBOUNCE and reader logs (was Re: Introducing
Victoria Coleman, WMF Chief Technology Officer)
Katherine Maher wrote:
>
>... If you have further questions about Victoria’
Katherine Maher wrote:
>
>... If you have further questions about Victoria’s work with the U.S.
> Department of Defense, it is/should soon be a matter of U.S.
> Congressional record. Her findings and recommendations will also
> be a matter of public record, as all government work should be.
>
Hi everyone,
Given Victoria’s many engagements over two decades, we weren’t able to list
everything in the announcement itself.
I can assure you that we carefully considered all of Victoria’s past
experience and, with her full support, vetted her background for areas of
possible concern, as is
Gerard Meijssen wrote:
>
> There are two conflicting approaches to vulnerabilities known
> to"government"; vulnerabilities make government vulnerable
> and therefore they need to be handled properly in code. The
> other approach is that a vulnerability is a vector to attack
Well, the general
Hoi,
There are two conflicting approaches to vulnerabilities known to
"government"; vulnerabilities make government vulnerable and therefore they
need to be handled properly in code. The other approach is that a
vulnerability is a vector to attack.
When Mrs Coleman works for the WMF, it follows
A similar thought crossed my mind regarding MediaWiki software. I believe
that a number of USG agencies use MediaWiki, and that some of them use it
for classified purposes. This is a bit of a two-edged sword; I imagine that
they'd want to support the continued development of MediaWiki (which is
It's great that the CTO position was filled.
The blog announcement's biography omitted these details:
"As Director for Security Initiatives for Intel’s Digital Enterprise
Group [Victoria Coleman] was responsible for defining the company’s
security technology roadmap and translating it to product
17 matches
Mail list logo