Recent Posts
Paper Notes 1984 Trojan Horses Hackers
Summary To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.
Key Findings You can’t trust code you did not totally create yourself.
Highlights and Takeaways Old school cybersecurity, early take on breaking into computers
Other Notes/Additional Thoughts (OPTIONAL) Review by [rfhacker]
@rfhacker +++
Author: rfhacker |
Published: March 28, 2024 |
Comments
Paper Notes Key Findings This paper analyzes conversations across eight social media platforms over 34 years to identify consistent patterns of toxic content. Key findings include:
Long conversations exhibit higher toxicity, but toxic language doesn’t discourage participation. Debates and contrasting sentiments among users contribute to intense discussions. Patterns of conversation dynamics have persisted over decades, highlighting the role of human behavior in shaping online discourse. Despite varying platform policies, a common thread of toxicity and user engagement dynamics is evident.
Author: Stu |
Published: March 23, 2024 |
Comments