{"id":6828,"date":"2017-01-06T05:12:59","date_gmt":"2017-01-06T09:12:59","guid":{"rendered":"http:\/\/www.zephoria.org\/thoughts\/?p=6828"},"modified":"2017-01-31T10:15:12","modified_gmt":"2017-01-31T14:15:12","slug":"hacking-the-attention-economy","status":"publish","type":"post","link":"https:\/\/www.zephoria.org\/thoughts\/archives\/2017\/01\/06\/hacking-the-attention-economy.html","title":{"rendered":"Hacking the Attention Economy"},"content":{"rendered":"<p id=\"3219\" class=\"graf graf--p graf-after--figure\">For most non-technical folks, \u201chacking\u201d evokes the notion of using sophisticated technical skills to break through the security of a corporate or government system for illicit purposes. Of course, most folks who were engaged in cracking security systems weren\u2019t necessarily in it for espionage and cruelty. In the 1990s, I grew up among teenage hackers who wanted to break into the computer systems of major institutions that were part of the security establishment, just to show that they could. The goal here was to feel a sense of power in a world where they felt pretty powerless. The rush was in being able to do something and feel smarter than the so-called powerful. It was fun and games. <span class=\"markup--quote markup--p-quote is-other\" data-creator-ids=\"c86f16ab9be0\">At least until they started getting arrested.<\/span><\/p>\n<p id=\"4b8b\" class=\"graf graf--p graf-after--p\">Hacking has always been about leveraging skills to push the boundaries of systems. Keep in mind that one early definition of a hacker (from the <a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/www.dourish.com\/goodies\/jargon.html\" target=\"_blank\" data-href=\"http:\/\/www.dourish.com\/goodies\/jargon.html\">Jargon File<\/a>) was \u201cA person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary.\u201d In another early definition (<a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/www.rfc-editor.org\/rfc\/rfc1392.txt\" target=\"_blank\" data-href=\"http:\/\/www.rfc-editor.org\/rfc\/rfc1392.txt\">RFC:1392<\/a>), a hacker is defined as \u201cA person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.\u201d Both of these definitions highlight something important: violating the security of a technical system isn\u2019t necessarily the primary objective.<\/p>\n<p id=\"f50f\" class=\"graf graf--p graf-after--p\">Indeed, over the last 15 years, I\u2019ve watched as countless hacker-minded folks have started leveraging a mix of technical and social engineering skills to reconfigure networks of power. Some are in it for the fun. Some see dollar signs. Some have a much more ideological agenda. But above all, what\u2019s fascinating is how many people have learned to play the game. <span class=\"markup--quote markup--p-quote is-other\" data-creator-ids=\"fb13ef612adb\">And in some worlds, those skills are coming home to roost in unexpected ways, especially as groups are seeking to mess with information intermediaries in an effort to hack the attention economy.<\/span><\/p>\n<figure id=\"1a27\" class=\"graf graf--figure graf--layoutOutsetLeft graf-after--h3\" data-scroll=\"native\">\n<div class=\"aspectRatioPlaceholder is-locked\">\n<div class=\"progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded\" data-image-id=\"1*o3PUkXOaKhaIwH4YpBsakg.jpeg\" data-width=\"490\" data-height=\"394\" data-scroll=\"native\"><canvas class=\"progressiveMedia-canvas js-progressiveMedia-canvas\" width=\"75\" height=\"60\"><\/canvas><img decoding=\"async\" class=\"progressiveMedia-image js-progressiveMedia-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/600\/1*o3PUkXOaKhaIwH4YpBsakg.jpeg\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/600\/1*o3PUkXOaKhaIwH4YpBsakg.jpeg\" \/><\/div>\n<\/div><figcaption class=\"imageCaption\"><a class=\"markup--anchor markup--figure-anchor\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/\" target=\"_blank\" data-href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/\">CC BY-NC 2.0<\/a>-licensed <a class=\"markup--anchor markup--figure-anchor\" href=\"https:\/\/www.flickr.com\/photos\/artgraff\/4600824914\/\" target=\"_blank\" data-href=\"https:\/\/www.flickr.com\/photos\/artgraff\/4600824914\/\">photo<\/a> by <a class=\"markup--anchor markup--figure-anchor\" href=\"https:\/\/www.flickr.com\/photos\/artgraff\/\" target=\"_blank\" data-href=\"https:\/\/www.flickr.com\/photos\/artgraff\/\">artgraff<\/a>.<\/figcaption><\/figure>\n<h3 id=\"4d13\" class=\"graf graf--h3 graf-after--p\"><strong class=\"markup--strong markup--h3-strong\">It all began with memes\u2026 (and\u00a0porn\u2026)<\/strong><\/h3>\n<p id=\"a699\" class=\"graf graf--p graf-after--h3\">In 2003, a 15-year-old named Chris Poole started an image board site based on a Japanese trend called 4chan. His goal was not political. Rather, like many of his male teenage peers, he simply wanted a place to share pornography and anime. But as his site\u2019s popularity grew, he ran into a different problem\u200a\u2014\u200ahe couldn\u2019t manage the traffic while storing all of the content. So he decided to delete older content as newer content came in. Users were frustrated that their favorite images disappeared so they reposted them, often with slight modifications. This gave birth to a phenomenon now understood as \u201cmeme culture.\u201d <a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/%3Chttp\/\/knowyourmeme.com\/memes\/lolcats\" target=\"_blank\" data-href=\"http:\/\/%3Chttp:\/\/knowyourmeme.com\/memes\/lolcats\">Lolcats<\/a> are an example. These are images of cats captioned with a specific font and a consistent grammar for entertainment.<\/p>\n<figure id=\"5578\" class=\"graf graf--figure graf--layoutOutsetLeft graf-after--p\" data-scroll=\"native\">\n<div class=\"aspectRatioPlaceholder is-locked\">\n<div class=\"aspectRatioPlaceholder-fill\"><\/div>\n<div class=\"progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded\" data-image-id=\"1*7_m4dF9OqBjePqqRyJ1O-g.jpeg\" data-width=\"600\" data-height=\"400\" data-action=\"zoom\" data-action-value=\"1*7_m4dF9OqBjePqqRyJ1O-g.jpeg\" data-scroll=\"native\"><canvas class=\"progressiveMedia-canvas js-progressiveMedia-canvas\" width=\"75\" height=\"50\"><\/canvas><img decoding=\"async\" class=\"progressiveMedia-image js-progressiveMedia-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/600\/1*7_m4dF9OqBjePqqRyJ1O-g.jpeg\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/600\/1*7_m4dF9OqBjePqqRyJ1O-g.jpeg\" \/><\/div>\n<\/div>\n<\/figure>\n<p id=\"8fd4\" class=\"graf graf--p graf-after--figure\">Those who produced meme-like images quickly realized that they could spread like wildfire thanks to new types of social media (as well as older tools like blogging). People began producing memes just for fun. But for a group of hacker-minded teenagers who were born a decade after I was, a new practice emerged. Rather than trying to hack the security infrastructure, they wanted to attack the emergent attention economy. They wanted to show that they could manipulate the media narrative, just to show that they could. This was happening at a moment when social media sites were skyrocketing, YouTube and blogs were challenging mainstream media, and pundits were pushing the idea that anyone could control the narrative by being their own media channel. Hell, <a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/content.time.com\/time\/magazine\/article\/0,9171,1570810,00.html\" target=\"_blank\" data-href=\"http:\/\/content.time.com\/time\/magazine\/article\/0,9171,1570810,00.html\">\u201cYou\u201d<\/a> was TIME Magazine\u2019s person of the year in 2006.<\/p>\n<p id=\"75de\" class=\"graf graf--p graf-after--p\">Taking a humorist approach, campaigns emerged within 4chan to \u201chack\u201d mainstream media. For example, many inside 4chan felt that widespread anxieties about pedophilia were exaggerated and sensationalized. They decided to target Oprah Winfrey, who, they felt, was amplifying this fear-mongering. Trolling her online message board, they got her to talk on live TV about how \u201cover 9,000 penises\u201d were raping children. Humored by this success, they then created a broader campaign around a fake character known as Pedobear. In a different campaign, 4chan \u201cb-tards\u201d focused on <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/techcrunch.com\/2009\/04\/27\/time-magazine-throws-up-its-hands-as-it-gets-pwned-by-4chan\/\" target=\"_blank\" data-href=\"https:\/\/techcrunch.com\/2009\/04\/27\/time-magazine-throws-up-its-hands-as-it-gets-pwned-by-4chan\/\">gaming the TIME 100 list of \u201cthe world\u2019s most influential people\u201d<\/a> by arranging it such that the first letter of each name on the list spelled out \u201cMarblecake also the game,\u201d which is a known in-joke in this community. Many other campaigns emerged to troll major media and other cultural leaders. And frankly, it was hard not to laugh when everyone started scratching their heads about why Rick Astley\u2019s 1987 song \u201cNever Gonna Give You Up\u201d suddenly became <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/en.wikipedia.org\/wiki\/Rickrolling\" target=\"_blank\" data-href=\"https:\/\/en.wikipedia.org\/wiki\/Rickrolling\">a phenomenon again<\/a>.<\/p>\n<blockquote id=\"6d2c\" class=\"graf graf--pullquote graf-after--p\"><p>By engaging in these campaigns, participants learned how to shape information within a networked ecosystem. They learned how to design information for it to spread across social\u00a0media.<\/p><\/blockquote>\n<p id=\"ecc1\" class=\"graf graf--p graf-after--pullquote\">They also learned how to game social media, manipulate its algorithms, and mess with the incentive structure of both old and new media enterprises. They weren\u2019t alone. I watched teenagers throw brand names and Buzzfeed links into their Facebook posts to increase the likelihood that their friends would see their posts in their News Feed. Consultants starting working for companies to produce catchy content that would get traction and clicks. Justin Bieber fans ran campaign after campaign to keep Bieber-related topics in Twitter Trending Topics. And the activist group Invisible Children leveraged knowledge of how social media worked to <a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/www.huffingtonpost.com\/danah-boyd\/post_3126_b_1345782.html\" target=\"_blank\" data-href=\"http:\/\/www.huffingtonpost.com\/danah-boyd\/post_3126_b_1345782.html\">architect the #Kony2012 campaign<\/a>. All of this was seen as legitimate \u201csocial media marketing,\u201d making it hard to detect where the boundaries were between those who were hacking for fun and those who were hacking for profit or other \u201cserious\u201d ends.<\/p>\n<p id=\"56d0\" class=\"graf graf--p graf-after--p\">Running campaigns to shape what the public could see was nothing new, but social media created new pathways for people and organizations to get information out to wide audiences. Marketers discussed it as the future of marketing. Activists talked about it as the next frontier for activism. Political consultants talked about it as the future of political campaigns. And a new form of propaganda emerged.<\/p>\n<h3 id=\"2d31\" class=\"graf graf--h3 graf-after--p\"><strong class=\"markup--strong markup--h3-strong\">The political side to the\u00a0lulz<\/strong><\/h3>\n<p id=\"2ef3\" class=\"graf graf--p graf-after--h3\">In her phenomenal account of Anonymous\u200a\u2014\u200a<a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/www.amazon.com\/exec\/obidos\/ASIN\/1781685835\/danah-20\" target=\"_blank\" data-href=\"http:\/\/www.amazon.com\/exec\/obidos\/ASIN\/1781685835\/danah-20\">\u201cHacker, Hoaxer, Whistleblower, Spy\u201d<\/a>\u200a\u2014\u200aGabriella Coleman describes the interplay between different networks of people playing similar hacker-esque games for different motivations. She describes the goofy nature of those \u201cAnons\u201d who created a campaign to expose Scientology, which many believed to be a farcical religion with too much power and political sway. But she also highlights how the issues became more political and serious as WikiLeaks emerged, law enforcement started going after hackers, and the Arab Spring began.<\/p>\n<figure id=\"f6d7\" class=\"graf graf--figure graf--layoutOutsetLeft graf-after--p\" data-scroll=\"native\">\n<div class=\"aspectRatioPlaceholder is-locked\">\n<div class=\"progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded\" data-image-id=\"1*_O914ThNFfnSnW-Pji7VBw.jpeg\" data-width=\"800\" data-height=\"567\" data-action=\"zoom\" data-action-value=\"1*_O914ThNFfnSnW-Pji7VBw.jpeg\" data-scroll=\"native\"><canvas class=\"progressiveMedia-canvas js-progressiveMedia-canvas\" width=\"75\" height=\"52\"><\/canvas><img decoding=\"async\" class=\"progressiveMedia-image js-progressiveMedia-image\" src=\"https:\/\/cdn-images-1.medium.com\/max\/600\/1*_O914ThNFfnSnW-Pji7VBw.jpeg\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/600\/1*_O914ThNFfnSnW-Pji7VBw.jpeg\" \/><\/div>\n<\/div><figcaption class=\"imageCaption\"><a class=\"markup--anchor markup--figure-anchor\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/deed.en\" target=\"_blank\" data-href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/deed.en\">CC BY-SA 3.0<\/a>-licensed <a class=\"markup--anchor markup--figure-anchor\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:2011_Egyptian_protests_Facebook_%26_jan25_card.jpg\" target=\"_blank\" data-href=\"https:\/\/commons.wikimedia.org\/wiki\/File:2011_Egyptian_protests_Facebook_%26_jan25_card.jpg\">photo<\/a> by <a class=\"markup--anchor markup--figure-anchor\" href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Essam_Sharaf\" target=\"_blank\" data-href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Essam_Sharaf\">Essam Sharaf<\/a> via <a class=\"markup--anchor markup--figure-anchor\" href=\"https:\/\/commons.wikimedia.org\/wiki\/Main_Page\" target=\"_blank\" data-href=\"https:\/\/commons.wikimedia.org\/wiki\/Main_Page\">Wikimedia Commons<\/a>.<\/figcaption><\/figure>\n<p id=\"025a\" class=\"graf graf--p graf-after--figure\">Anonymous was birthed out of 4chan, but because of the emergent ideological agendas of many Anons, the norms and tactics started shifting. Some folks were in it for fun and games, but the \u201clulz\u201d started getting darker and those seeking vigilante justice started using techniques like <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/en.wikipedia.org\/wiki\/Doxing\" target=\"_blank\" data-href=\"https:\/\/en.wikipedia.org\/wiki\/Doxing\">\u201cdoxing\u201d<\/a>to expose people who were seen as deserving of punishment. Targets changed over time, showcasing the divergent political agendas in play.<\/p>\n<p id=\"d608\" class=\"graf graf--p graf-after--p\">Perhaps the most notable turn involved <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/en.wikipedia.org\/wiki\/Gamergate_controversy\" target=\"_blank\" data-href=\"https:\/\/en.wikipedia.org\/wiki\/Gamergate_controversy\">\u201c#GamerGate\u201d<\/a> when issues of sexism in the gaming industry emerged into a campaign of harassment targeted at a group of women. Doxing began being used to enable <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/en.wikipedia.org\/wiki\/Swatting_%28hoaxing%29\" target=\"_blank\" data-href=\"https:\/\/en.wikipedia.org\/wiki\/Swatting_%28hoaxing%29\">\u201cswatting\u201d<\/a>\u200a\u2014\u200ain which false reports called in by perpetrators would result in SWAT teams sent to targets\u2019 homes. The strategies and tactics that had been used to enable decentralized but coordinated campaigns were now being used by those seeking to use the tools of media and attention to do serious reputational, psychological, economic, and social harm to targets. Although 4chan had long been an \u201canything goes\u201d environment (with notable exceptions), #GamerGate became taboo there for stepping over the lines.<\/p>\n<p id=\"6aad\" class=\"graf graf--p graf-after--p\">As #GamerGate unfolded, men\u2019s rights activists began using the situation to push forward a long-standing political agenda to counter feminist ideology, pushing for #GamerGate to be framed as a serious debate as opposed to being seen as a campaign of hate and harassment. In some ways, the resultant media campaign was quite successful: major conferences and journalistic enterprises felt the need to \u201chear both sides\u201d as though there was a debate unfolding. Watching this, I couldn\u2019t help but think of the work of Frank Luntz, a remarkably effective conservative political consultant known for reframing issues using politicized language.<\/p>\n<p id=\"3059\" class=\"graf graf--p graf-after--p\">As doxing and swatting have become more commonplace, another type of harassment also started to emerge en masse: gaslighting. This term refers to a 1944 Ingrid Bergman film called \u201cGas Light\u201d (which was based on a 1938 play). The film depicts psychological abuse in a domestic violence context, where the victim starts to doubt reality because of the various actions of the abuser. It is a form of psychological warfare that can work tremendously well in an information ecosystem, especially one where it\u2019s possible to put up information in a distributed way to make it very unclear what is legitimate, what is fake, and <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/points.datasociety.net\/whats-propaganda-got-to-do-with-it-5b88d78c3282\" target=\"_blank\" data-href=\"https:\/\/points.datasociety.net\/whats-propaganda-got-to-do-with-it-5b88d78c3282\">what is propaganda<\/a>. More importantly, as many autocratic regimes have learned, this tactic is fantastic for seeding the public\u2019s doubt in institutions and information intermediaries.<\/p>\n<h3 id=\"8a35\" class=\"graf graf--h3 graf-after--p\"><strong class=\"markup--strong markup--h3-strong\">The democratization of manipulation<\/strong><\/h3>\n<p id=\"bad6\" class=\"graf graf--p graf-after--h3\">In the early days of blogging, many of my fellow bloggers imagined that our practice could disrupt mainstream media. For many progressive activists, social media could be a tool that could circumvent institutionalized censorship and enable a plethora of diverse voices to speak out and have their say. Civic minded scholars were excited by \u201csmart mobs\u201d who leveraged new communications platforms to coordinate in a decentralized way to speak truth to power. Arab Spring. Occupy Wall Street. Black Lives Matter. These energized progressives as \u201cproof\u201d that social technologies could make a new form of civil life possible.<\/p>\n<p id=\"1d66\" class=\"graf graf--p graf-after--p\">I spent 15 years watching teenagers play games with powerful media outlets and attempt to achieve control over their own ecosystem. They messed with algorithms, coordinated information campaigns, and resisted attempts to curtail their speech. Like Chinese activists, they learned to hide their traces when it was to their advantage to do so. <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1925128\" target=\"_blank\" data-href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1925128\">They encoded their ideas such that access to content didn\u2019t mean access to meaning.<\/a><\/p>\n<p id=\"c4c2\" class=\"graf graf--p graf-after--p\">Of course, it wasn\u2019t just progressive activists and teenagers who were learning how to mess with the media ecosystem that has emerged since social media unfolded. We\u2019ve also seen the political establishment, law enforcement, marketers, and hate groups build capacity at manipulating the media landscape. Very little of what\u2019s happening is truly illegal, but there\u2019s no widespread agreement about which of these practices are socially and morally acceptable or not.<\/p>\n<p id=\"97fd\" class=\"graf graf--p graf-after--p\">The techniques that are unfolding are hard to manage and combat. Some of them look like harassment, prompting people to self-censor out of fear. Others look like \u201cfake news\u201d, highlighting the messiness surrounding bias, misinformation, disinformation, and propaganda. There is hate speech that is explicit, but there\u2019s also suggestive content that prompts people to frame the world in particular ways. Dog whistle politics have emerged in a new form of encoded content, where you have to be in the know to understand what\u2019s happening. Companies who built tools to help people communicate are finding it hard to combat the ways their tools are being used by networks looking to skirt the edges of the law and content policies. Institutions and legal instruments designed to stop abuse are finding themselves ill-equipped to function in light of networked dynamics.<\/p>\n<p id=\"7651\" class=\"graf graf--p graf-after--p\">The Internet has long been used for gaslighting, and trolls have long targeted adversaries. What has shifted recently is the scale of the operation, the coordination of the attacks, and the strategic agenda of some of the players.<\/p>\n<blockquote id=\"649c\" class=\"graf graf--pullquote graf-after--p\"><p>For many who are learning these techniques, it\u2019s no longer simply about fun, nor is it even about the lulz. It has now become about acquiring power.<\/p><\/blockquote>\n<p id=\"2db8\" class=\"graf graf--p graf-after--pullquote\">A new form of information manipulation is unfolding in front of our eyes. It is political. It is global. And it is populist in nature. <span class=\"markup--quote markup--p-quote is-other\" data-creator-ids=\"8711afc9d48d\">The news media is being played like a fiddle, while decentralized networks of people are leveraging the ever-evolving networked tools around them to hack the attention economy.<\/span><\/p>\n<p id=\"7b7c\" class=\"graf graf--p graf-after--p graf--last\">I only wish I knew what happens next.<\/p>\n<p class=\"graf graf--p graf-after--p graf--last\"><em>This post was first published as part of a series on\u00a0<\/em><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/points.datasociety.net\/tagged\/public-sphere\" target=\"_blank\" rel=\"nofollow\" data-href=\"https:\/\/points.datasociety.net\/tagged\/public-sphere\"><em class=\"markup--em markup--p-em\">media, accountability, and the public sphere<\/em><\/a><em class=\"markup--em markup--p-em\">. See also:<\/em><\/p>\n<ul class=\"postList\">\n<li id=\"b501\" class=\"graf graf--li graf-after--p\"><a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/points.datasociety.net\/whats-propaganda-got-to-do-with-it-5b88d78c3282\" target=\"_blank\" data-href=\"https:\/\/points.datasociety.net\/whats-propaganda-got-to-do-with-it-5b88d78c3282\">What\u2019s Propaganda Got To Do With It?<\/a> by Caroline Jack<\/li>\n<li id=\"163b\" class=\"graf graf--li graf-after--li\"><a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/points.datasociety.net\/did-media-literacy-backfire-7418c084d88d\" target=\"_blank\" data-href=\"https:\/\/points.datasociety.net\/did-media-literacy-backfire-7418c084d88d\">Did Media Literacy Backfire?<\/a> by danah boyd<\/li>\n<li id=\"9162\" class=\"graf graf--li graf-after--li\"><a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/points.datasociety.net\/are-there-limits-to-online-free-speech-14dbb7069aec\" target=\"_blank\" data-href=\"https:\/\/points.datasociety.net\/are-there-limits-to-online-free-speech-14dbb7069aec\">Are There Limits to Online Free Speech?<\/a> by Alice Marwick<\/li>\n<li id=\"0e18\" class=\"graf graf--li graf-after--li\"><a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/points.datasociety.net\/why-america-is-self-segregating-d881a39273ab\" target=\"_blank\" data-href=\"https:\/\/points.datasociety.net\/why-america-is-self-segregating-d881a39273ab\">Why America is Self-Segregating<\/a> by danah boyd<\/li>\n<li id=\"f68c\" class=\"graf graf--li graf-after--li\"><a class=\"markup--anchor markup--li-anchor\" href=\"https:\/\/points.datasociety.net\/how-do-you-deal-with-a-problem-like-fake-news-80f9987988a9\" target=\"_blank\" data-href=\"https:\/\/points.datasociety.net\/how-do-you-deal-with-a-problem-like-fake-news-80f9987988a9\">How do you deal with a problem like \u201cfake news?\u201d<\/a> by Robyn Caplan<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>This post was also translated\u00a0to <a href=\"https:\/\/www.manualdousuario.net\/hackeando-economia-da-atencao\/\">Portuguese<\/a>.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For most non-technical folks, \u201chacking\u201d evokes the notion of using sophisticated technical skills to break through the security of a corporate or government system for illicit purposes. Of course, most folks who were engaged in cracking security systems weren\u2019t necessarily in it for espionage and cruelty. In the 1990s, I grew up among teenage hackers [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_s2mail":"yes","footnotes":""},"categories":[1],"tags":[1136,1541,2111,312],"class_list":["post-6828","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-attention","tag-hacking","tag-manipulation","tag-media"],"_links":{"self":[{"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/posts\/6828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/comments?post=6828"}],"version-history":[{"count":3,"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/posts\/6828\/revisions"}],"predecessor-version":[{"id":6838,"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/posts\/6828\/revisions\/6838"}],"wp:attachment":[{"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/media?parent=6828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/categories?post=6828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.zephoria.org\/thoughts\/wp-json\/wp\/v2\/tags?post=6828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}