Topic: Internet (Page 4)

You are looking at all articles with the topic "Internet". We found 72 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— SHA-3 NIST announcement controversy

πŸ”— Internet πŸ”— Computing πŸ”— Cryptography πŸ”— Numismatics πŸ”— Numismatics/Cryptocurrency πŸ”— Computing/Computer Security

SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like structure of SHA-1 and SHA-2.

SHA-3 is a subset of the broader cryptographic primitive family Keccak (), designed by Guido Bertoni, Joan Daemen, MichaΓ«l Peeters, and Gilles Van Assche, building upon RadioGatΓΊn. Keccak's authors have proposed additional uses for the function, not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on certain architectures, and AEAD ciphers Keyak and Ketje.

Keccak is based on a novel approach called sponge construction. Sponge construction is based on a wide random function or random permutation, and allows inputting ("absorbing" in sponge terminology) any amount of data, and outputting ("squeezing") any amount of data, while acting as a pseudorandom function with regard to all previous inputs. This leads to great flexibility.

NIST does not currently plan to withdraw SHA-2 or remove it from the revised Secure Hash Standard. The purpose of SHA-3 is that it can be directly substituted for SHA-2 in current applications if necessary, and to significantly improve the robustness of NIST's overall hash algorithm toolkit.

The creators of the Keccak algorithms and the SHA-3 functions suggest using the faster function KangarooTwelve with adjusted parameters and a new tree hashing mode without extra overhead for small message sizes.

Discussed on

πŸ”— Valid Email Addresses

πŸ”— Technology πŸ”— Internet πŸ”— Computing πŸ”— Computing/Networking

An email address identifies an email box to which email messages are delivered. A wide variety of formats were used in early email systems, but only a single format is used today, following the specifications developed for Internet mail systems since the 1980s. This article uses the term email address to refer to the addr-spec defined in RFC 5322, not to the address that is commonly used; the difference is that an address may contain a display name, a comment, or both.

An email address such as John.Smith@example.com is made up of a local-part, an @ symbol, then a case-insensitive domain. Although the standard requires the local part to be case-sensitive, it also urges that receiving hosts deliver messages in a case-independent fashion, e.g., that the mail system at example.com treat John.Smith as equivalent to john.smith; some mail systems even treat them as equivalent to johnsmith. Mail systems often limit their users' choice of name to a subset of the technically valid characters, and in some cases also limit which addresses it is possible to send mail to.

With the introduction of internationalized domain names, efforts are progressing to permit non-ASCII characters in email addresses.

Discussed on

πŸ”— Dead Internet Theory

πŸ”— Internet πŸ”— Skepticism πŸ”— Alternative Views

The dead Internet theory is a theory that asserts that the Internet now consists almost entirely of bot activity and automatically generated content, marginalizing human activity. The date given for this "death" is generally around 2016 or 2017.

In 2012, YouTube removed billions of video views from major record labels, such as Sony and Universal, as a result of discovering that they had used fraudulent services to artificially increase the views of their content. The removal of the inflated views aimed to restore credibility to the platform and improve the accuracy of view counts. The move by YouTube also signaled a change in the way the platform would tackle fake views and bot traffic.

Discussed on

πŸ”— Bitmessage: a decentralized, encrypted, trustless communications protocol

πŸ”— Internet πŸ”— Computing πŸ”— Telecommunications πŸ”— Cryptography πŸ”— Cryptography/Computer science

Bitmessage is a decentralized, encrypted, peer-to-peer, trustless communications protocol that can be used by one person to send encrypted messages to another person, or to multiple subscribers.

In June 2013, the software experienced a surge of new adoptions after news reports of email surveillance by the US National Security Agency.

Bitmessage was conceived by software developer Jonathan Warren, who based its design on the decentralized digital currency, bitcoin. The software was released in November 2012 under the MIT license.

Bitmessage gained a reputation for being out of reach of warrantless wiretapping conducted by the National Security Agency (NSA), due to the decentralized nature of the protocol, and its encryption being difficult to crack. As a result, downloads of the Bitmessage program increased fivefold during June 2013, after news broke of classified email surveillance activities conducted by the NSA.

Bitmessage has also been mentioned as an experimental alternative to email by Popular Science and CNET.

Some ransomware programs instruct affected users to use Bitmessage to communicate with the attackers.

πŸ”— Mt.Gox does not mean "Mount" Gox

πŸ”— Companies πŸ”— Internet πŸ”— Crime πŸ”— Finance & Investment πŸ”— Numismatics πŸ”— Websites πŸ”— Websites/Computing πŸ”— Numismatics/Cryptocurrency πŸ”— Cryptocurrency

Mt. Gox was a bitcoin exchange based in Shibuya, Tokyo, Japan. Launched in July 2010, by 2013 and into 2014 it was handling over 70% of all bitcoin (BTC) transactions worldwide, as the largest bitcoin intermediary and the world's leading bitcoin exchange.

In February 2014, Mt. Gox suspended trading, closed its website and exchange service, and filed for bankruptcy protection from creditors. In April 2014, the company began liquidation proceedings.

Mt. Gox announced that approximately 850,000 bitcoins belonging to customers and the company were missing and likely stolen, an amount valued at more than $450 million at the time. Although 200,000 bitcoins have since been "found", the reasons for the disappearanceβ€”theft, fraud, mismanagement, or a combination of theseβ€”were initially unclear. New evidence presented in April 2015 by Tokyo security company WizSec led them to conclude that "most or all of the missing bitcoins were stolen straight out of the Mt. Gox hot wallet over time, beginning in late 2011."

Discussed on

πŸ”— Node.js wikipedia entry marked for deletion for not being notable

πŸ”— Internet πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Free and open-source software πŸ”— JavaScript

Node.js is an open-source, cross-platform, JavaScript runtime environment that executes JavaScript code outside of a web browser. Node.js lets developers use JavaScript to write command line tools and for server-side scriptingβ€”running scripts server-side to produce dynamic web page content before the page is sent to the user's web browser. Consequently, Node.js represents a "JavaScript everywhere" paradigm, unifying web-application development around a single programming language, rather than different languages for server- and client-side scripts.

Though .js is the standard filename extension for JavaScript code, the name "Node.js" doesn't refer to a particular file in this context and is merely the name of the product. Node.js has an event-driven architecture capable of asynchronous I/O. These design choices aim to optimize throughput and scalability in web applications with many input/output operations, as well as for real-time Web applications (e.g., real-time communication programs and browser games).

The Node.js distributed development project was previously governed by the Node.js Foundation, and has now merged with the JS Foundation to form the OpenJS Foundation, which is facilitated by the Linux Foundation's Collaborative Projects program.

Corporate users of Node.js software include GoDaddy, Groupon, IBM, LinkedIn, Microsoft, Netflix, PayPal, Rakuten, SAP, Voxer, Walmart, and Yahoo!.

Discussed on

πŸ”— Evercookie

πŸ”— Internet πŸ”— Computing πŸ”— Computing/Software πŸ”— Websites πŸ”— Websites/Computing πŸ”— Computing/Computer Security πŸ”— Computing/Websites

Evercookie is a JavaScript-based application created by Samy Kamkar that produces zombie cookies in a web browser that are intentionally difficult to delete. In 2013, a top-secret NSA document was leaked by Edward Snowden, citing Evercookie as a method of tracking Tor users.

Discussed on

πŸ”— Alt-Right Pipeline

πŸ”— Internet πŸ”— Politics

The alt-right pipeline (also called the alt-right rabbit hole) is a conceptual model regarding internet radicalization toward the alt-right movement. It describes a phenomenon in which consuming provocative right-wing political content, such as antifeminist or anti-SJW ideas, gradually increases exposure to the alt-right or similar far-right politics. It posits that this interaction takes place due to the interconnected nature of political commentators and online communities, allowing members of one audience or community to discover more extreme groups. This process is most commonly associated with and has been documented on the video platform YouTube, is also largely faceted by the method in which algorithms on various social media platforms function through the process recommending content that is similar to what users engage with, but can quickly lead users down rabbit-holes.

Many political movements have been associated with the pipeline concept. The intellectual dark web, libertarianism, the men's rights movement, and the alt-lite movement have all been identified as possibly introducing audiences to alt-right ideas. BreadTube has similarly been identified as introducing audiences to far-left politics, though it has been less effective. Audiences that seek out and are willing to accept extreme content in this fashion typically consist of young men, commonly those that experience significant loneliness and seek belonging or meaning. In an attempt to find community and belonging, message boards that are often proliferated with hard right social commentary, such as 4chan and 8chan, have been well documented in their importance in the radicalization process.

The alt-right pipeline may be a contributing factor to domestic terrorism. Many social media platforms have acknowledged this path of radicalization and have taken measures to prevent it, including the removal of extremist figures and rules against hate speech and misinformation.

Discussed on

πŸ”— Cross Chess

πŸ”— Internet

Discussed on

πŸ”— Roko's Basilisk

πŸ”— Internet πŸ”— Internet culture πŸ”— Philosophy πŸ”— Futures studies

Roko's basilisk is a thought experiment which states that an otherwise benevolent artificial superintelligence (AI) in the future would be incentivized to create a virtual reality simulation to torture anyone who knew of its potential existence but did not directly contribute to its advancement or development. It originated in a 2010 post at discussion board LessWrong, a technical forum focused on analytical rational enquiry. The thought experiment's name derives from the poster of the article (Roko) and the basilisk, a mythical creature capable of destroying enemies with its stare.

While the theory was initially dismissed as nothing but conjecture or speculation by many LessWrong users, LessWrong co-founder Eliezer Yudkowsky reported users who described symptoms such as nightmares and mental breakdowns upon reading the theory, due to its stipulation that knowing about the theory and its basilisk made one vulnerable to the basilisk itself. This led to discussion of the basilisk on the site to be banned for five years. However, these reports were later dismissed as being exaggerations or inconsequential, and the theory itself was dismissed as nonsense, including by Yudkowsky himself. Even after the post's discreditation, it is still used as an example of principles such as Bayesian probability and implicit religion. It is also regarded as a modern version of Pascal's wager. In the field of artificial intelligence, Roko's basilisk has become notable as an example that raises the question of how to create an AI which is simultaneously moral and intelligent.

Discussed on