Comment by Cyph0n
7 hours ago
The CCP angle is the PR version. From last year: https://www.axios.com/local/salt-lake-city/2024/05/06/senato...
Note that there have been multiple instances over the past two years of high level ex/current officials repeating the same general point.
[flagged]
It’s January. My bad for not being as infallible as you are.
That’s not what Romney said. His - and the wider establishment’s - concern is that unsanctioned content is allowed to be treated the same as any other content.
Anyone knows that TikTok simply tailors your feed to your interests & interactions. But even this is not acceptable when it comes to topics the establishment doesn’t want disseminated.
And if they had undeniable proof that TikTok was boosting/manipulating such content, why haven’t they revealed it now that TikTok US is under US control?
But it’s okay to not be concerned. Just don’t come crying when the book burning starts.
> That’s not what Romney said. His - and the wider establishment’s - concern is that unsanctioned content is allowed to be treated the same as any other content.
The axios article you linked was not actually very clear about what Romney said, and the actual quotes are consistent with my points.
> Anyone knows that TikTok simply tailors your feed to your interests & interactions.
You'd have to be pretty naive to think that's all that it does or all that it will ever do. Think about it: the most effective kind of influence and manipulation would also be "[tailored] to your interests & interactions," and subtle enough that you don't perceive it as manipulation.
> And if they had undeniable proof that TikTok was boosting/manipulating such content, why haven’t they revealed it now that TikTok US is under US control?
They don't need undeniable proof, just like I don't need undeniable proof that I've been hacked to lock down my router. Are you saying I should enable remote admin and leave a weak password until I have undeniable proof I've been compromised? Because that's the standard you seem to be setting for mitigating vulnerabilities.
2 replies →