{"id":8697,"date":"2020-04-22T21:24:24","date_gmt":"2020-04-22T18:24:24","guid":{"rendered":"https:\/\/forklog.media\/?p=8697"},"modified":"2020-04-23T00:58:05","modified_gmt":"2020-04-22T21:58:05","slug":"researchers-will-fork-facebook-and-populate-it-with-bots","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/researchers-will-fork-facebook-and-populate-it-with-bots\/","title":{"rendered":"Researchers Will \u201cFork\u201d Facebook and Populate It With Bots"},"content":{"rendered":"<p>In order to pinpoint vulnerabilities and exploits, Facebook launches a software simulation of its own network populated exclusively by bots. The project was dubbed Web-Enabled Simulation (WES). Its <a href=\"https:\/\/research.fb.com\/publications\/wes-agent-based-user-interaction-simulation-on-real-infrastructure\/\">white paper<\/a> was published on the Facebook research site.<\/p>\n<p><!--more--><\/p>\n<h2>How Does It Work?<\/h2>\n<p>Unlike traditional simulations which often employ models of the real product, the WES system will operate on the actual real-world Facebook platform. This Facebook \u201cfork\u201d will be no different from the original one, except that its users will be exclusively bots that simulate human users\u2019 behaviour. Researchers state that this behaviour can be rule-based and programmable, or it can be learnt independently. Researchers compared this simulation to a game and their bots to existing bots in online multiplayer games. The project is thus expected to draw heavily on recent advances in machine learning for software games, a topic that has witnessed many recent breakthroughs.<\/p>\n<blockquote><p><b><i>\u201cA WES simulation can be seen as a game, in which we have a set of players that operate to fulfil a certain objective on a software platform. This observation connects research on WES systems with research on AI-Assisted Game Play.\u201d<\/i><\/b><\/p><\/blockquote>\n<p>Researchers state that the main purpose of WES bots will be to misbehave. Supposedly applying advanced machine learning technology, bots will \u201ctry to break the community standards in a safe isolated environment in order to test and harden the infrastructure that prevents real bad actors from contravening community standards.\u201d Some advanced mischievous bots will even be able to cooperate toward a common goal.<\/p>\n<p>Other bots will play the role of scam victims and exhibit behaviours akin to real-life Facebook scam-targets. But the actual Facebook users may never learn about the existence of this \u201cunderworld Facebook\u201d populated by rogue robots and their hapless bot victims. Researchers insist that the \u201chuman\u201d version of Facebook should be isolated from the \u201cbot\u201d Facebook. But at the same time suggest that certain \u201cread-only bots\u201d will be able to peer through the looking-glass into the world of human users for the sake of the experiment.<\/p>\n<p>This simulation is meant to help Facebook better protect their users. For example, once a new update is rolled onto the WES simulation there might be an uptick in rogue bots compromising the victim bots\u2019 data or otherwise successfully attacking them. In that case, Facebook can track and fix the bug, without real users having to suffer.<\/p>\n<h2>What Are the Real-Life Implications?<\/h2>\n<p>Battling hackers and scammers certainly is a plausible and sufficient reason for having a shadow-copy of Facebook populated exclusively by bots. But it is hard to deny that such an experiment does provide Facebook with many other opportunities.<\/p>\n<p>For one, a realistic Facebook simulation has to be something any internet marketer would give a limb for. With some tweaking, it could become a handy instrument to gauge the efficiency of ad campaigns, test new features and otherwise predict the behaviour of Facebook users in bulk.<\/p>\n<p>But there may be other implications, closely connected to cyber warfare. We know that there are independent and government-backed groups that already experiment with creating extensive programmable bot networks within various social networks to simulate real-user behaviour and interact with users for different nefarious reasons, from pushing scam to meddling in the elections. A good example would be the \u201cRussian bots\u201d <a href=\"https:\/\/www.foxnews.com\/tech\/russian-bots-sow-social-upheaval-across-us-using-facebook-twitter-experts-say\">scandal<\/a> that first erupted in 2016. Facebook got under a lot of heat over that incident but the truth is almost four years later they are still <a href=\"https:\/\/www.vice.com\/en_us\/article\/gyzkay\/facebook-had-to-nuke-a-bunch-of-russian-bots-right-as-it-bragged-its-ready-for-2020\">struggling<\/a> to solve that issue.<\/p>\n<p>Without a doubt, the WES Facebook project will be used to give team Facebook a better understanding of how bot networks operate and help it identify bot behaviours and take action against rogue bot accounts early. But another implication is that Facebook itself will end up with an extensive network of bots who are nigh indistinguishable from human users.<\/p>\n<p>Researchers insist that during the experiment only the read-only bots should be allowed to access the human-populated Facebook to avoid any interactions between humans and bots. But things may change in the future.<\/p>\n<p><b>Follow us on <\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b> and <\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b> and join our <\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b> to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In order to pinpoint vulnerabilities and exploits, Facebook launches a software simulation of its own network populated exclusively by bots. The project was dubbed Web-Enabled Simulation (WES). Its white paper was published on the Facebook research site.<\/p>\n","protected":false},"author":6,"featured_media":8699,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1111,611,465],"class_list":["post-8697","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity","tag-facebook","tag-social-media"],"aioseo_notices":[],"amp_enabled":true,"views":"798","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/8697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=8697"}],"version-history":[{"count":4,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/8697\/revisions"}],"predecessor-version":[{"id":8703,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/8697\/revisions\/8703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/8699"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=8697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=8697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=8697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}