Stay connected with latest and Breaking news.

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

गुरुवार, 27 जनवरी 2022

Alien Mission

Alien Mission
By

Fine, we can go search the Himalayas for the Yeti ONE more time, but keep a safe altitude over the Pacific and PLEASE watch where you're going. We can't afford another Amelia Earhart incident.



January 26, 2022 at 09:00AM
via xkcd.com https://xkcd.com/2573/
Share:

सोमवार, 24 जनवरी 2022

Abuse and harassment on the blockchain

Abuse and harassment on the blockchain
By Molly White

In order to responsibly develop new technologies, it is critical to ask “how will this be used for evil?” Technology companies employ red teamers, risk assessors, and ethicists to do just that, or at least so they can say they are. Software engineers have formed initiatives like the Ethical Source movement,1 recognizing the importance of deeply considering this question.

“How will this technology be used to harass and abuse people?” is a form of that question that too often goes unasked, particularly given that the demographics of people who are most at risk for abuse and harassment tend to be underrepresented in the industry. Apple apparently didn’t put much thought into how its AirTag location tracking discs could be misused by stalkers and domestic abusers.23 Target didn’t realize how its attempts to market to expectant mothers might out pregnant teenagers to their families.4 Slack didn’t foresee how people might use its invitation feature to send people harassing messages they couldn’t block.5

In the frenzy to attract venture capital funding and draw new users and investors into blockchain technologies, this question is once again going unasked. While blockchain proponents speak about a “future of the web” based around public ledgers, anonymity, and immutability, those of us who have been harassed online look on in horror as obvious vectors for harassment and abuse are overlooked, if not outright touted as features.

Public transactions

Some cryptocurrency enthusiasts envision a world where cryptocurrencies have replaced dollars and euros (which they refer to as “fiat”; I prefer the term “real money”), and transactions are done on the blockchain rather than with physical cash or transactions through centralized banks. Cryptocurrencies allow for anonymity, and unlike with traditional banking, connecting one’s real-life identity to a wallet address is purely optional. This works just fine when you’re just trading ape pictures online or planting pixel sunflowers in a play-to-earn game, but falls apart a bit in the theoretical future where you’re standing in the checkout line using cryptocurrency to pay for your gallon of milk.

People who keep their cryptocurrency wallet addresses private often do so with good reason: there is very little privacy available once your crypto wallet address is known, because every transaction is publicly visible, and attempts to obscure them often easily unobscured with chain analysis tools. Imagine if, when you Venmo-ed your Tinder date for your half of the meal, they could now see every other transaction you’d ever made—and not just on Venmo, but the ones you made with your credit card, bank transfer, or other apps, and with no option to set the visibility of the transfer to “private”. The split checks with all of your previous Tinder dates? That monthly transfer to your therapist? The debts you’re paying off (or not), the charities to which you’re donating (or not), the amount you’re putting in a retirement account (or not)? The location of that corner store right by your apartment where you so frequently go to grab a pint of ice cream at 10pm? Not only would this all be visible to that one-off Tinder date, but also to your ex-partners, your estranged family members, your prospective employers. An abusive partner could trivially see you siphoning funds to an account they can’t control as you prepare to leave them. As for the marketing machines and predictive algorithms that currently suck in every scrap of data they can to determine what ads to show you, or evaluate your suitability for a mortgage,6 or try to predict if you’ll commit a crime?7 Well, they’ve just hit the jackpot.

“Just use a different anonymous wallet”, people might say. This is much easier in theory than in practice, since funds in a wallet have to come from somewhere, and it’s not difficult to infer what might be happening when your known wallet address suddenly transfers money off to a new, empty wallet. There are certainly ways to successfully and anonymously do it, typically using cryptocurrency tumblers, cryptocurrency ATMs, or even mining fresh coins, but they require technological acumen: knowing how to anonymize transfers, but even to know what can potentially be used to link two addresses to begin with. Even if one succeeds in setting up a separate and anonymous wallet, quite a lot of care must be taken to successfully maintain its anonymity. And as chain analysis technologies progress, tying various wallets and transactions together becomes more accessible to those who wish to do so. In the best case scenario, a person ends up with many different wallets with varying degrees of anonymity, and has to try to keep track of which is which and who’s allowed to know about which wallet.


Immutability

We are seeing a much wider array of products built atop the blockchain these days: video games, social networks, dating applications, porn platforms. Although “blockchain” for many brings to mind cryptocurrency exchanges and NFT trading platforms, where most interaction between users is simple transactions, the space is increasingly including much more full-featured applications. And as applications add in features like commenting and messaging, they become vectors for harassment.

One commonly-touted feature of blockchains is their immutability: once data is written to the blockchain, it is there forever.8 While this can have useful applications, such as when storing straightforward transaction records, it is a nightmare when you think about its implications for user-created data, particularly when considered through the lens of abuse and harassment. If someone stores revenge porn or child sexual abuse material on a blockchain, it is there forever and cannot be removed. Individual platforms built on the blockchain can choose not to display it, but the data is still there and can be accessed by anyone, either directly or by just choosing to use a different platform built on the same chain. This means that if someone is a victim of revenge porn, the best they can do is reach out to individual platforms and petition them to hide the content—this could be many, many platforms, and even still, the content remains available on the chain to those who wish to look for it.

As a quick aside, the details of how images and other large data would be stored on a blockchain are somewhat in question. For the purposes of argument I am assuming that they would either be stored on-chain, or a pointer to an image stored on a distributed filesystem like the InterPlanetary File System (IPFS)9 would be stored on-chain. On blockchains like Ethereum, it is prohibitively expensive to store images on-chain—even at today’s relatively low Ethereum prices, it costs about $175 to store a kilobyte of data, meaning your average 140KB Bored Ape JPEG would cost about $25,000 to store. However, there are blockchains where image storage is more feasible. It’s also quite possible that these platforms would choose to store pointers to images hosted on centralized services like AWS, in which case taking down content becomes quite straightforward—however, though this is common practice in web3 projects today, it is antithetical to web3 ideals and tends to draw scorn from the community when discovered.

Even ignoring the doors that immutability opens for malicious actors, immutable social network content is horrifying given what people post themselves. Imagine if the cringy posts by a twelve-year-old were guaranteed to be available in perpetuity as soon as they were saved. Or if the ill-conceived, drunken ramblings of a person who had few too many were there forever, not deleteable the following day. Imagine if a person uploading a photo of the cookies they just baked didn’t realize until after they hit “post” that the envelope on the table in the background showed their home address.

Airdrops

Furthermore, tokens can be “airdropped” to specific addresses, with no consent required by the recipient. Often used as a way to distribute free NFTs for giveaways and other promotional campaigns, there is nothing stopping someone from airdropping NFTs with abusive content—doxing, revenge porn, child sexual abuse imagery, threats, etc.—into someone’s wallet. Some platforms automatically display airdropped NFTs until they are manually hidden by users, increasing the impact of such an attack. And even if someone hides or burns an NFT of this sort, the transaction and its contents remain immutably on the blockchain for anyone to see.


1 address ≠ 1 individual

When I receive a harassing message on the social networks I use, it tends to be pretty straightforward to just block the user. Most social networks introduce barriers to creating armies of new harassment accounts to cycle through when one is blocked, typically requiring email or phone verification, and using this data along with device data to propagate any bans to new accounts created with the same details.

With blockchains, the ability to easily create new addresses is a feature and intended use of the technology. When projects have tried to use wallet addresses to identify an individual user, such in the case of Adidas trying to limit an NFT drop to two per person, they have been trivially circumvented.10 While it’s possible that blockchain-based social networks could rely on additional data and identity verification to limit account creation in similar ways to what major social media networks do today, the libertarian ethos behind many of the services springing up in this space make that seem unlikely to catch on.


There is surprisingly little discussion of the enormous potential for abuse built in to blockchain-based technologies, and I’ve barely even scraped the surface here. Indeed, I did a search for “blockchain harassment” and found little more than promotional materials for some startup apparently solving workplace harassment ~*~ with the blockchain ~*~ (god help me). Both the web3 space and its group of outspoken critics have, to date, struck me as overwhelmingly male, which I suspect plays a role in this. Though often described as though it will somehow solve all of the inequalities that are built in to society, the leaders in the blockchain space don’t appear to actually be thinking about a lot of them.


Notes

  1. Ethical Source ↩︎

  2. Ingram, David (December 23, 2021). “A tracking device made by Apple is showing up in suspected crimes”. NBC News↩︎

  3. Wilson, Mark (April 29, 2021). “Apple AirTags could enable domestic abuse in terrifying ways”. Fast Company↩︎

  4. Duhigg, Charles (February 16, 2012). “How Companies Learn Your Secrets”. The New York Times↩︎

  5. Statt, Nick (March 24, 2021). https://www.theverge.com/2021/3/24/22348422/slack-connect-direct-message-abuse-harassment. The Verge↩︎

  6. Heaven, Will Douglas (June 17, 2021). “Bias isn’t the only problem with credit scores—and no, AI can’t help”. MIT Technology Review↩︎

  7. “Predictive policing” (January 22, 2022). Wikipedia. ↩︎

  8. Except when it’s not, as I describe in another blog post↩︎

  9. “InterPlanetary File System” (January 22, 2022). Wikipedia. ↩︎

  10. “Adidas learns the hard way that limiting the number of NFTs one person can buy is hard”. Web3 Is Going Great↩︎





January 22, 2022 at 04:00AM
via Molly White https://ift.tt/32rTY5E
Share:

शुक्रवार, 21 जनवरी 2022

Why is Research at Caribbean Medical Schools Important?

Why is Research at Caribbean Medical Schools Important?
By

Why is Research at Caribbean Medical Schools Important? Marie McGillycuddy: Welcome to Medical school in five minutes where we bring you topics pertaining to medical school that will benefit anyone in medical school or anyone who is interested in joining medical school. My name is Marie McGillicuddy, and I will be your host. Joining us today is Dr. Fakoya and he is the associate professor of growth and developmental anatomy and histology at the University of Medicine and Health Sciences in St. Kitts. Dr. Fakoya has published in numerous journals and books in overseas research at the University. Please check out some of his published works here: <a href="https://ift.tt/3Aky5lb" rel="nofollow">https://ift.tt/32mlukR> Dr. Fakoya, thank you for joining us today. I have one primary question for you. Why is conducting research in medical school important? Dr Fakoya: Well, Marie, thank you. Thank you for having me. And that's a very good question. Conducting research in medical school is an essential skill that every medical student should have. And it's not just a skill, it's also some we have so many aspects that conducting research in general to the students. Let me start off by saying that one of the things that we want to impact when medical students come on board is essential medical knowledge. Let's start off from what we call the Bloom's taxonomy. Some of you are probably familiar with the term called the Bloom's taxonomy. And I mean, we know that we're talking about the 6th level kind of training that we want the medical students to have. The first level would be knowledge. We want to impact knowledge on a medical student, but that's not all we want to give. We want to go on in medical school, especially not like other courses, but in medical school, we want to move on to the next level of which we say Bloom's taxonomy, which is a comprehension that means they understand, they know why this is done, and why that's done. But is that all? No. We go into the next step with Application, and that is key. So most of the way we would test our students in the medical school is all about the clinical vicinity on how these students would apply the knowledge they gain in class from little labs here and there into a clinical scenario. Now the question Marie asks is - Why is research important? You see that across most medical schools, this is probably where you're going to stop. I mean, application of knowledge. Now, what takes us higher on the Broom's taxonomy is research because there's no way you really want to test analysis and maybe synthesis in the question format. But when we are as an institution and able to introduce research into the activity of the students and the activities, we're taking them higher than most other institutions will give, which is just application. So we can go on to another level, which is analysis, because from the research skills that they're going to get, they're going to be able to analyze several information that has been given to them from maybe several review papers. And also from there, we move on to the next level of the Blooms, which is synthesis. So from several dates and several information they gather from several papers they are able to synthesize any new information which is going to be very applicable to the scientific, medical and scientific community. So that is one of the key things that we look forward to when we introduce research into medical education. Of course, we know the last level of Bloom's is evaluation. It's hard at this point. Maybe later on when they do go into residency, finish residency, then they can judge and can evaluate all the information from all the professionals as well. But as a medical institution we want to ensure that we get them to the peak of that knowledge. So that is one aspect, one reason why we think research is very key to our medical education. I still have other ones. Marie McGillycuddy Dr. Fakoya, we have 30 seconds left. Let me ask you something very quickly, if that's okay. Are there research opportunities if you go to a medical school in the Caribbean? Dr Adegbenro Fakoya Well, there are research opportunities but one thing I can tell you is that UMHS, provides research opportunities more than any other medical school that you probably maybe you can say maybe one. Some of you would have heard some of the names but when you put UMHS with all the medical school in terms of research opportunities, we would rank in the 90 over 90% as to how much opportunities you get, which you will not get in most other schools. So that's one reason to choose tests. Marie McGillycuddy: Excellent. Thank you, Doctor Fakoya. For more information and a general overview of The university of Medicine and Health Sciences please check out this page: <a href="https://ift.tt/3nYSM1W" rel="nofollow">https://ift.tt/3zGRLgZ> More information about research at UMHS can be found here: <a href="https://ift.tt/3qRfTN4" rel="nofollow">https://ift.tt/3tW2wNc>

from University of Medicine and Health Sciences <a href="https://www.youtube.com/watch?v=5_gv9ZGvXGw" rel="nofollow">https://www.youtube.com/watch?v=5_gv9ZGvXGw</a> via UMHS YouTube Channel





January 22, 2022 at 12:36AM
via https://www.youtube.com/watch?v=5_gv9ZGvXGw
Share:

बुधवार, 19 जनवरी 2022

Hypothesis Generation

Hypothesis Generation
By

Frazzled scientists are requesting that everyone please stop generating hypotheses for a little bit while they work through the backlog.



January 17, 2022 at 09:00AM
via xkcd.com https://xkcd.com/2569/
Share:

रविवार, 9 जनवरी 2022

Moxie Marlinspike >> Blog >> My first impressions of web3

Moxie Marlinspike >> Blog >> My first impressions of web3
By

Jan 07, 2022





January 8, 2022 at 05:26PM
via https://ift.tt/3q3wc8P
Share:

बुधवार, 5 जनवरी 2022

Throat and Nasal Passages

Throat and Nasal Passages
By

I always felt like what the 'you are now aware of your tongue' thing needed in order to be truly enjoyable was an element of mortal peril.



January 3, 2022 at 09:00AM
via xkcd.com https://xkcd.com/2563/
Share:

Definition List

Unordered List

Support