Random Articles (Page 6)
Have a deep view into what people are curious about.
π Alt-Right Pipeline
The alt-right pipeline (also called the alt-right rabbit hole) is a conceptual model regarding internet radicalization toward the alt-right movement. It describes a phenomenon in which consuming provocative right-wing political content, such as antifeminist or anti-SJW ideas, gradually increases exposure to the alt-right or similar far-right politics. It posits that this interaction takes place due to the interconnected nature of political commentators and online communities, allowing members of one audience or community to discover more extreme groups. This process is most commonly associated with and has been documented on the video platform YouTube, is also largely faceted by the method in which algorithms on various social media platforms function through the process recommending content that is similar to what users engage with, but can quickly lead users down rabbit-holes.
Many political movements have been associated with the pipeline concept. The intellectual dark web, libertarianism, the men's rights movement, and the alt-lite movement have all been identified as possibly introducing audiences to alt-right ideas. BreadTube has similarly been identified as introducing audiences to far-left politics, though it has been less effective. Audiences that seek out and are willing to accept extreme content in this fashion typically consist of young men, commonly those that experience significant loneliness and seek belonging or meaning. In an attempt to find community and belonging, message boards that are often proliferated with hard right social commentary, such as 4chan and 8chan, have been well documented in their importance in the radicalization process.
The alt-right pipeline may be a contributing factor to domestic terrorism. Many social media platforms have acknowledged this path of radicalization and have taken measures to prevent it, including the removal of extremist figures and rules against hate speech and misinformation.
Discussed on
- "Alt-Right Pipeline" | 2023-04-23 | 32 Upvotes 50 Comments
π Mozilla made $436M from search deals in 2018
The Mozilla Corporation (stylized as moz://a) is a wholly owned subsidiary of the Mozilla Foundation that coordinates and integrates the development of Internet-related applications such as the Firefox web browser, by a global community of open-source developers, some of whom are employed by the corporation itself. The corporation also distributes and promotes these products. Unlike the non-profit Mozilla Foundation, and the Mozilla open source project, founded by the now defunct Netscape Communications Corporation, the Mozilla Corporation is a taxable entity. The Mozilla Corporation reinvests all of its profits back into the Mozilla projects. The Mozilla Corporation's stated aim is to work towards the Mozilla Foundation's public benefit to "promote choice and innovation on the Internet."
A MozillaZine article explained:
The Mozilla Foundation will ultimately control the activities of the Mozilla Corporation and will retain its 100 percent ownership of the new subsidiary. Any profits made by the Mozilla Corporation will be invested back into the Mozilla project. There will be no shareholders, no stock options will be issued and no dividends will be paid. The Mozilla Corporation will not be floating on the stock market and it will be impossible for any company to take over or buy a stake in the subsidiary. The Mozilla Foundation will continue to own the Mozilla trademarks and other intellectual property and will license them to the Mozilla Corporation. The Foundation will also continue to govern the source code repository and control who is allowed to check in.
Discussed on
- "Mozilla made $436M from search deals in 2018" | 2020-08-12 | 32 Upvotes 3 Comments
π Self-tiling tile set
A self-tiling tile set, or setiset, of order n is a set of n shapes or pieces, usually planar, each of which can be tiled with smaller replicas of the complete set of n shapes. That is, the n shapes can be assembled in n different ways so as to create larger copies of themselves, where the increase in scale is the same in each case. Figure 1 shows an example for n = 4 using distinctly shaped decominoes. The concept can be extended to include pieces of higher dimension. The name setisets was coined by Lee Sallows in 2012, but the problem of finding such sets for n = 4 was asked decades previously by C. Dudley Langford, and examples for polyaboloes (discovered by Martin Gardner, Wade E. Philpott and others) and polyominoes (discovered by Maurice J. Povah) were previously published by Gardner.
Discussed on
- "Self-tiling tile set" | 2015-10-14 | 139 Upvotes 21 Comments
π Bicameralism (Psychology)
Bicameralism (the condition of being divided into "two-chambers") is a hypothesis in psychology that argues that the human mind once operated in a state in which cognitive functions were divided between one part of the brain which appears to be "speaking", and a second part which listens and obeysβa bicameral mind. The term was coined by Julian Jaynes, who presented the idea in his 1976 book The Origin of Consciousness in the Breakdown of the Bicameral Mind, wherein he made the case that a bicameral mentality was the normal and ubiquitous state of the human mind as recently as 3,000 years ago, near the end of the Mediterranean bronze age.
Discussed on
- "Bicameralism (Psychology)" | 2019-07-06 | 51 Upvotes 29 Comments
π Differential Power Analysis
In cryptography, power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device (such as a smart card, tamper-resistant "black box", or integrated circuit). The attack can non-invasively extract cryptographic keys and other secret information from the device.
Simple power analysis (SPA) involves visually interpreting power traces, or graphs of electrical activity over time. Differential power analysis (DPA) is a more advanced form of power analysis, which can allow an attacker to compute the intermediate values within cryptographic computations through statistical analysis of data collected from multiple cryptographic operations. SPA and DPA were introduced to the open cryptology community in 1998 by Paul Kocher, Joshua Jaffe and Benjamin Jun.
π CMS Pipelines
CMS Pipelines implements the pipeline concept under the VM/CMS operating system. The programs in a pipeline operate on a sequential stream of records. A program writes records that are read by the next program in the pipeline. Any program can be combined with any other because reading and writing is done through a device independent interface.
Discussed on
- "CMS Pipelines" | 2016-04-27 | 43 Upvotes 12 Comments
π Domain Fronting
Domain fronting is a technique for Internet censorship circumvention that uses different domain names in different communication layers of an HTTPS connection to discreetly connect to a different target domain than is discernable to third parties monitoring the requests and connections.
Due to quirks in security certificates, the redirect systems of the content delivery networks (CDNs) used as 'domain fronts', and the protection provided by HTTPS, censors are typically unable to differentiate circumvention ("domain-fronted") traffic from overt non-fronted traffic for any given domain name. As such they are forced to either allow all traffic to the domain frontβincluding circumvention trafficβor block the domain front entirely, which may result in expensive collateral damage and has been likened to "blocking the rest of the Internet".
Domain fronting does not conform to HTTP standards that require the SNI extension and HTTP Host header to contain the same domain. Many large cloud service providers, including Amazon, Microsoft, and Google, actively prohibit domain fronting, which has limited it as a censorship bypass technique. Pressure from censors in Russia and China is thought to have contributed to these prohibitions, but domain fronting can also be used maliciously.
A newer variant of domain fronting, domain hiding, passes an encrypted request for one resource (say, a website), concealed behind an unencrypted (plaintext) request for another resource whose DNS records are stored in the same cloud. It has much the same effect. Refraction networking is an application of the broader principle.
π Pheasant Island belongs to Spain and France in alternating 6 months periods
Pheasant Island (French: Γle des Faisans/Γle de la ConfΓ©rence, Spanish: Isla de los Faisanes, Basque: Konpantzia) is an uninhabited river island in the Bidasoa river, located between France and Spain, whose administration alternates between both nations.
π Rescue of Roger Mallinson and Roger Chapman
The rescue of Roger Mallinson and Roger Chapman occurred between 29 August and 1 September 1973 after their Vickers Oceanics small submersible Pisces III was trapped on the seabed at a depth of 1,575Β ft (480Β m), 150Β mi (240Β km) off Ireland in the Celtic Sea. The 76-hour multinational rescue effort resulted in the deepest sub rescue in history.
Discussed on
- "Rescue of Roger Mallinson and Roger Chapman" | 2021-09-04 | 31 Upvotes 1 Comments
π List Of Adhesive Tapes
The following is a list of adhesive tapes with pressure-sensitive adhesives:
Discussed on
- "List Of Adhesive Tapes" | 2022-04-15 | 162 Upvotes 135 Comments