LW is a place where people know their fallacies and pattern match to them.
God I hope not, that’s like not having heard of the Disagreement Hierarchy. The “central point” was about inner experience, so pattern matching towards “DH6″ is the more “lesswrong” thing to do then to pattern match towards “ad hominem”. Pattern matching towards “ad hominem” is an example of the “standard rationality” thing that Eliezer spend the entire Sequences attempting to deconstruct and improve upon. If LW has degenerated back to that, then maybe we need another read-through of the sequences.
If you want a security...
If you actually use your real name for everything you say online, then it’s your own fault when you get in such a bind. Basic courtesy is to know when to use your real name and when not to, and to not let that shit happen.
In reality rationality is about accepting that the world is the way it is and not as you want it to be. In this case it seems like you don’t want to accept it the way it is. In this case it always useful to keep your audience in mind and if you are making some far off point about psychonautics then you have to be extra careful or accepted that you get downvoted.
If you actually use your real name for everything you say online, then it’s your own fault when you get in such a bind. Basic courtesy is to know when to use your real name and when not to, and to not let that shit happen.
Stylometry is pretty good these days. At the 29C3 there was a talk that demostrated a 72% successful author attribution rate for some underground online forums. Underground meaning forums where illegal goods where sold, so the participants are interested in being anonymous. The idea that you can reasonable protect your anonymity by using a nickname is naive.
The idea that you can reasonable protect your anonymity by using a nickname is naive.
I think not so naive as all that. The effectiveness of a security measure depends on the threat. If your worry is “employers searching for my name or email address” then a pseudonym works fine. If your worry is “law enforcement checking whether a particular forum post was written by a particular suspect,” then it’s not so good. And if your worry is “they are wiretapping me or will search my computer”, then the pseudonym is totally unhelpful.
I think in most LW contexts—including drug discussions—the former model is a better match. My impression is that security clearance investigations in the United States involve a lot of interviews with friends and family, but, at the present time, don’t involve highly sophisticated computer analysis.
I think in most LW contexts—including drug discussions—the former model is a better match. My impression is that security clearance investigations in the United States involve a lot of interviews with friends and family, but, at the present time, don’t involve highly sophisticated computer analysis.
Given the way the NSA works I would highly doubt that they don’t check information in their databases when handing out a security clearance and run highly sophisticated computer analysis. The actual capabilities of those programs are going to be classified. The NSA doesn’t want people to know about the capabilities they have.
In addition the internet doesn’t forget. NSA computer programs might not be good enough at the present to catch it but they might be in five years. Especially the whole Snowden episode encouraged the NSA to invest a lot more effort into gathering data about possible leakers and have computer programs that analyse the behavior of people with a security clearance.
God I hope not, that’s like not having heard of the Disagreement Hierarchy. The “central point” was about inner experience, so pattern matching towards “DH6″ is the more “lesswrong” thing to do then to pattern match towards “ad hominem”. Pattern matching towards “ad hominem” is an example of the “standard rationality” thing that Eliezer spend the entire Sequences attempting to deconstruct and improve upon. If LW has degenerated back to that, then maybe we need another read-through of the sequences.
If you actually use your real name for everything you say online, then it’s your own fault when you get in such a bind. Basic courtesy is to know when to use your real name and when not to, and to not let that shit happen.
In reality rationality is about accepting that the world is the way it is and not as you want it to be. In this case it seems like you don’t want to accept it the way it is. In this case it always useful to keep your audience in mind and if you are making some far off point about psychonautics then you have to be extra careful or accepted that you get downvoted.
Stylometry is pretty good these days. At the 29C3 there was a talk that demostrated a 72% successful author attribution rate for some underground online forums. Underground meaning forums where illegal goods where sold, so the participants are interested in being anonymous. The idea that you can reasonable protect your anonymity by using a nickname is naive.
I think not so naive as all that. The effectiveness of a security measure depends on the threat. If your worry is “employers searching for my name or email address” then a pseudonym works fine. If your worry is “law enforcement checking whether a particular forum post was written by a particular suspect,” then it’s not so good. And if your worry is “they are wiretapping me or will search my computer”, then the pseudonym is totally unhelpful.
I think in most LW contexts—including drug discussions—the former model is a better match. My impression is that security clearance investigations in the United States involve a lot of interviews with friends and family, but, at the present time, don’t involve highly sophisticated computer analysis.
Given the way the NSA works I would highly doubt that they don’t check information in their databases when handing out a security clearance and run highly sophisticated computer analysis. The actual capabilities of those programs are going to be classified. The NSA doesn’t want people to know about the capabilities they have.
In addition the internet doesn’t forget. NSA computer programs might not be good enough at the present to catch it but they might be in five years. Especially the whole Snowden episode encouraged the NSA to invest a lot more effort into gathering data about possible leakers and have computer programs that analyse the behavior of people with a security clearance.