Complex.
https://www.bespacific.com/the-dangerous-legal-strategy-coming-for-our-books/
The Dangerous Legal Strategy Coming for Our Books
The Atlantic – Our picture book was pulled from library shelves in Florida [no paywall]: The argument being used to defend the ban threatens the right to read. By Justin Richardson and Peter Parnell. “In 2023, our book was one of thousands pulled from library shelves around the country, and as we write, an evolving legal strategy being used to defend many such bans threatens to upend decades of precedent preserving the right to read. The danger this doctrine poses to free speech should worry us all—even those who would rather their children not learn about gay penguins. In Tango, a pair of male chinstrap penguins in the Central Park Zoo become parents when a kindhearted zookeeper gives them an egg to hatch. (The story is both true and personal to us; when we wrote it, we were also trying to have a child.) Tango turned 20 in June, and for many of its years in print, it has been one of the most frequently challenged books in America. But until recently, it had never actually been removed from the collection of a public-school library, or any public library for that matter. That’s because of a 1982 Supreme Court decision establishing that freedom of speech includes the right to access the speech of others through their books. Every challenge to a public-library book since has been subject to the Court’s ruling that officials may not remove a book simply because they disagree with its viewpoint. Things started to change for us when a teacher in Escambia County, Florida, complained that the goal of Tango was the “indoctrination” of students through an “LGBTQ agenda using penguins.” A committee responsible for reviewing educational materials for the county disagreed, concluding that the story teaches valuable lessons about science and tolerance and is appropriate for students of all ages. But the school board balked at the book’s message of acceptance. As one board member put it, “The fascination is still on that it’s two male penguins raising a chick.” Escambia pulled Tango from its school libraries, which serve roughly 40,000 children…”
We sued Escambia in federal court for viewpoint discrimination (the case is ongoing). In casting about for a way to defend the ban, the school board landed on the theory that library books represent “government speech.” The government, the board explained, has its own First Amendment rights and must be allowed to speak as it wishes. Thus, it can remove any library book it finds objectionable for any reason. When we first heard this argument, we thought it was absurd. But government-speech doctrine is not new. It was invoked by the Supreme Court in 2009, for example, to allow a Utah town to refuse to install a religious monument in a public park, and again in 2015 to permit the state of Texas to refuse to issue certain specialty license plates. Roughly speaking, the doctrine holds that any action deemed “government speech” is immune to the First Amendment claims of those whose speech is being censored. No court had ever found that library books represent government speech before May of this year, when the United States Court of Appeals for the Fifth Circuit swept aside decades of precedent, including its own previous decisions, to allow the removal of 17 books—Isabel Wilkerson’s Caste, Maurice Sendak’s In the Night Kitchen, and Jazz Jennings’s Being Jazz, among others—from the public libraries of Llano County, Texas. Seven judges in the majority agreed that “a library’s collection decisions are government speech and therefore not subject to Free Speech challenge.” And with that, the books were gone…”
If I remember correctly, that was always the goal.
https://thenextweb.com/news/rise-of-zero-workforce-startups
The next unicorn might not hire anyone
A decade ago, startups often equated success with rapid headcount growth. The formula was simple: build a product, raise a round, hire fast. Bigger teams meant bigger bets. But the rulebook is getting rewritten as a new generation of startups scales with leaner teams and fewer people. They’re not building out sprawling customer support or sales teams, and seem to be automating what once warranted entire departments. Their growth is quite remarkable.
Cursor, which became the fastest-growing SaaS company in history, generated $200mn in revenue with 30 employees. Midjourney made $200mnn with 40. Ben Lang’s site Tiny Teams tracks these small-but-mighty operators, with several emerging from Europe too. Sweden’s Lovable has a 25-strong team and achieved a $1.8bnn valuation just over six months after launching. Vlayer Labs, headquartered in Warsaw, secured $10mnn in pre-seed funding with 20 employees, while Berlin-based Juna AI raised $7.5mn with a seven-person team.
Can AI pick an idea out of a forest of words?
https://www.nature.com/articles/d41586-025-02616-5
What counts as plagiarism? AI-generated papers pose new risks
… In February, Gupta and Pruthi reported3 that they’d found multiple examples of AI-generated manuscripts that, according to external experts they consulted, used others’ ideas without attribution, although without directly copying words and sentences.
Gupta and Pruthi say that this amounts to the software tools plagiarizing other ideas — albeit with no ill intention on the part of their creators. “A significant portion of LLM-generated research ideas appear novel on the surface but are actually skillfully plagiarized in ways that make their originality difficult to verify,” they write.
… The issue of ‘idea plagiarism’, although little discussed, is already a problem with human-authored papers, says Debora Weber-Wulff, a plagiarism researcher at the University of Applied Sciences, Berlin, and she expects that it will get worse with work created by AI. But, unlike the more familiar forms of plagiarism — involving copied or subtly rewritten sentences — it’s hard to prove the reuse of ideas, she says.
That makes it difficult to see how to automate the task of checking for true novelty or originality, to match the pace at which AIs are going to be able to synthesize manuscripts.
“There’s no one way to prove idea plagiarism,” Weber-Wulff says.
Tools & Techniques. (Lessons for the paranoid.)
https://www.bespacific.com/burner-phone-101-workshop/
Burner Phone 101 Workshop
Rebecca Williams: “In August 2025, I hosted a Burner Phone 101 Workshop at the Brooklyn Public Library. [The link to the full text PDF of the program is here.] Below is a summary of the workshop with key points in bold and additional resources that participants helped crowdsource. Before the workshop began, we set the collective tone by sharing the goals, secret goals, and anti-goals. This helped participants know what to expect, created space for deeper learning, and reinforced the boundaries that kept the workshop safe and supportive. The goals were to learn about burner phones and have fun. The secret goals were to learn the limits of burner phones, connect them to broader digital privacy practices, and build confidence to share these lessons with loved ones. The anti-goals were just as important: do not share sensitive personal information and avoid framing these tools in ways that promote harm, harassment, or abuse. Know Your Risks – Many people carry a general sense of feeling unsafe, but it can be hard to name the specific fears or what those fears would affectuate if realized. That is why we framed risk modeling as the foundation for using a burner phone, built on three core questions:
What are you trying to protect?
Who are you protecting it from?
What happens if it fails?
Without this clarity, it is easy to end up applying a laundry list of privacy best practices that do not fit your needs and to miss the protections that actually matter. We applied the framework to four scenarios: attending a protest, being present at an ICE raid, facing harassment, and even protecting yourself from yourself in cases like phone addiction (which is also valid). We emphasized the need to work backwards from what you are protecting and from whom, and we also stressed considering the risks to others in your network, not only your own…”
No comments:
Post a Comment