Recent Posts

Reflections on Trusting Trust

Paper Notes 1984 Trojan Horses Hackers Summary To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software. Key Findings You can’t trust code you did not totally create yourself. Highlights and Takeaways Old school cybersecurity, early take on breaking into computers Other Notes/Additional Thoughts (OPTIONAL) Review by [rfhacker] @rfhacker +++

Persistent interaction patterns across social media platforms and over time

Paper Notes Key Findings This paper analyzes conversations across eight social media platforms over 34 years to identify consistent patterns of toxic content. Key findings include: Long conversations exhibit higher toxicity, but toxic language doesn’t discourage participation. Debates and contrasting sentiments among users contribute to intense discussions. Patterns of conversation dynamics have persisted over decades, highlighting the role of human behavior in shaping online discourse. Despite varying platform policies, a common thread of toxicity and user engagement dynamics is evident.