D5.2. Community Journalism Programme Digest

Total Page:16

File Type:pdf, Size:1020Kb

D5.2. Community Journalism Programme Digest D5.2. Community journalism programme digest Work​ ​package​ ​ ​ WP5: Communications & Dissemination Task​ ​ T5.2 Community journalism programme Due​ ​date​ ​ 31/01/2021 Submission​ ​date​ ​ 04/02/2021 Deliverable​ ​lead​ ​ Edgeryders Dissemination​ ​level​ ​ Public Nature​ ​ Report Authors​ ​ Nadia El-Imam, Inge Snip, Claire Duffy, Jeremiah Wilson, Abigail Davis, Lipsad, Noah Schoeppl, David Schmudde, CherryRecently (alias), Hugi Asgeirsson, Oliver Sauter, Carl-Johan Svenningson, Alberto Cottica, Adrian Cochrane, Slaughtr (alias), Mattias Axell, Jeff Andreoni, Matthias Ansorg, Chris McAdams, Peter Bihr, Zenna Fiscella, Elinor Weijmar, Christian Buggedei, Rowena Hennigan Version​ ​ 1.2 Reviewers​ ​ Katja Bego, Markus Droemann Status​ ​ Final Disclaimer​​: ​ ​The​ ​information ​ ​and ​ ​views​ ​set ​ ​out​ ​in ​ ​this ​ ​report ​ ​are​ ​those ​ ​of ​ ​the​ ​author(s) ​ ​and​ ​do​ ​not ​ ​necessarily ​ ​reflect ​ ​the ​ ​official​ ​opinion ​ ​of ​ ​the ​ ​European​ ​Union. ​ ​Neither ​ ​the ​ ​European​ ​Union​ ​institutions ​ and​ ​bodies ​ ​nor​ ​any ​ ​person ​ ​acting ​ ​on​ ​their​ ​behalf ​ ​may ​ ​be ​ ​held​ ​responsible​ ​for ​ ​the​ ​use​ ​which ​ ​may ​ ​be ​ ​made ​ ​of​ ​the​ ​information​ ​contained​ ​herein.​ ​ Acknowledgement​: This Report is part of a project that has received funding from the ​European Union's Horizon 2020 research and innovation programme under grant agreement Nº82565 1 Authors Editor: Nadia El-Imam Data analysis & visualisations: Amelia Hassoun, Alberto Cottica, Kate Sim Interviews: Inge Snip, Rowena Hennigan Authors: Nadia El-Imam, Inge Snip, Jeremiah Wilson, Abigail Davis, Lipsad, Noah Schoeppl, Hugi Asgeirsson, Oliver Sauter, Carl-Johan Svenningson, Alberto Cottica, Adrian Cochrane, Slaughtr (Alias), Mattias Axell, Jeff Andreoni, Matthias Ansorg, Chris Adams, Peter Bihr, Zenna Fiscella, Elinor Weijmar, Christian Buggedei 2 Introduction NGI Forward’s community journalism program is a tool for engagement of a broader, more diverse community of experts on the themes of the Next Generation Internet. The principle behind this work is to elicit conversation-starting posts, and use them to “seed” the NGI Exchange platform. To do so, we used a combination of open calls for contributions and targeted interviews with identified thought leaders. This, in the NGI consortium’s intentions, would make the platform more thought-provoking, and therefore more engaging. The strategy appears to have worked: ​at the time of writing, the Exchange hosts 3,946 posts from 320 unique contributors, for a total of 646,000 words – that’s well over three times the size of Melville’s​ Moby Dick​. It has received 230,000 page views so far. The selection of authors, interviewees and the subjects of their contributions to include in this publication took place after the conversations on the platform were already underway, and a first round of analysis of the materials conducted. We selected contributions that conveyed the themes, observations and questions emerging from the discussions on the platform. The posts in the community journalism program are meant to be read as stand-alone articles; shared on social media; and interacted with by way of a “Comment” button. They are published as regular forum posts on the Exchange platform; in 2021, we plan to add a second delivery method, using micro-websites that allow readers to comment posts without having to navigate the informational complexities of the forum. This deliverable collects in one document the 60 contributions collected under the community journalism program It is organised along 7 thematic chapters: ​Safety and Security, Windows of Perception, Inclusive Care and Welfare, Work, Livelihoods and Business, Freedom, Control and Justice, Polities, Politics and Democracy​. Alongside the text of the contributions themselves, each chapter includes some key insights by the authors of this deliverable. These are based on the online-ethnographic analysis of the whole Exchange corpus, not just of the community journalism program’s contributions. Their purpose is to place such contributions in the context of the broader conversation they helped to spur. We also include a 1,000 words account of the overarching narrative emerging from the program as a whole. We mean this deliverable as a monitoring tool, mainly for the benefit of the reviewers. We do not expect many people to engage with the ​document​ per se. We do, on the other hand, expect the NGI Exchange community of citizen experts to continue to engage with the 3 individual contributions it collects. The digest will also be published as a series of thematic mini-magazines each dedicated to one chapter theme to invite further discussion and dissemination. 4 Table of Contents Overarching Narrative 11 We’ve lost ownership over ourselves through the growing role of technology; how do we regain it? 11 Part I: Safety and Security 14 Key insights 14 Directory of Articles 15 On the first case in the EU against government use of an algorithmic decision-making system — an AMA with Anton Ekker 16 Why the algorithm was deemed to be unfair 16 “It may be unfair, but it works.” Or? 17 Standards for how to prevent bias and discrimination? 18 “They keep coming” 18 Global Governance of Emerging Technologies 19 Can tech design for survivors? 21 “Don't call them AI accidents” 22 Distributed systems promise great possibilities — and challenges 23 On personal data protection, GAIA X and humanitarian work 24 Conversation: Where next for online identities? 26 Disposable identities 27 Trust framework 27 Provable computing 27 Self-sovereign identities 28 Single source ID layer 28 Part II: Windows of Perception 30 Key insights 30 Directory of Articles 31 Epistemic resilience of the medical community 33 When something is “good”, should it be everywhere, all the time? 35 Bridging the gap between the tech world and modern policy-making on the collection and sharing of data 36 Building my own browser to explore decentralised discovery 38 Top Sites 38 Web Feeds 38 App Recommendations 39 Personalised Suggestions 39 Bookmarks & Bookmark Sharing 39 Combined Search 40 5 The problem does not lie within the data exclusively, it lies with our intended purpose for them 42 Stepping Outside, or: A Job for a Hacker 43 Period of Isolation 43 Cultivate Hobbies/Interests 43 Find a Community 43 Study 44 Seclusion/Isolation 44 Live Abroad 44 Autonomy 44 Spoil Yourself 45 Identify a Problem 45 On language ideologies: Does Alexa have Linguistic Authority? 46 Managing the Infrastructural Unknown: Magic as Craft 47 How do we organize society for a whole-systems approach for developing the Internet? 50 Just enough city? 52 Ideas to demand more from the internet and for the planet 53 How one decentralised social network became a promising model for the expanding collective intelligence 54 Part III: On Inclusive Care and Welfare 56 Key insights 56 Directory of Articles 57 Rushing introduction and use of AI and other networked digital technologies fuels inequalities and breeds resentment 58 Are housing cooperatives the future? 59 Can communities equipped with digital commons take on dysfunctional healthcare systems? 61 “In some cases, you should simply rule out AI, for example emotion detection” 64 Is the communitarian internet back in the wake of COVID-19? — A conversation with Howard Rheingold 65 On coordinating and integrating the community’s response 67 On helping folks to bring work online 67 Why is all this innovation not being channelled into ways to help people live a better life? 69 Welcome to Retirement 70 Part IV: Work, Livelihoods and Business 75 Key insights 76 Directory of Articles 78 Startups’ grand illusion: You have to be 10x better than what’s there 80 On digitalisation, industrialisation and loss of jobs during transitions between systems 81 6 Remote and distributed working has the potential to be a great equalizer 83 Recover from COVID with Flexibility 84 Tiny data for highly resilient societies of the future 85 Service design in a climate emergency — What do digital services in a world of net-zero look like? 86 Navigating COVID as a small location-based business 87 Can remote collaboration and coworking burst small-world complacency? 88 Virtual collaboration emerging as a competitive advantage 89 COVID presents opportunity to breathe life back into rural communities 92 Data as Labour 93 Remote work with human interaction is the way of the future 95 Distributed Teams as Distributed Economic Development 98 How to build a financially sustainable school for free and open-source developers? 102 Part V: Freedom, Control and Justice 103 Key insights 103 Directory of Articles 105 Is AI really worth the trouble: A meeting of minds on the promises and threats 107 When your tech is used to imprison and torture people 111 Front-running legislatures can foster AI that empowers users of digital technologies 114 A Radically New Internet — On P2P Protocols and Mesh Networks 116 Decentralisation of currency and information could lead to a “utopia” 118 A surveillance pandemic? Results of the community listening post on risks for freedom in the wake of COVID-19 119 About the listening event, and Edgeryders’s role in it 119 Result 1: There is cause to worry, but also leverage for defence. 120 Result 2. Contact tracing apps are ineffective against COVID-19, but may help in the next pandemic. 121 Result 3. Immunity passports are an unworkable idea. 122 Result 4. Locational data are impossible to anonymise, and of limited utility. Capacity for data governance is bad. 123
Recommended publications
  • Romanian Political Science Review Vol. XXI, No. 1 2021
    Romanian Political Science Review vol. XXI, no. 1 2021 The end of the Cold War, and the extinction of communism both as an ideology and a practice of government, not only have made possible an unparalleled experiment in building a democratic order in Central and Eastern Europe, but have opened up a most extraordinary intellectual opportunity: to understand, compare and eventually appraise what had previously been neither understandable nor comparable. Studia Politica. Romanian Political Science Review was established in the realization that the problems and concerns of both new and old democracies are beginning to converge. The journal fosters the work of the first generations of Romanian political scientists permeated by a sense of critical engagement with European and American intellectual and political traditions that inspired and explained the modern notions of democracy, pluralism, political liberty, individual freedom, and civil rights. Believing that ideas do matter, the Editors share a common commitment as intellectuals and scholars to try to shed light on the major political problems facing Romania, a country that has recently undergone unprecedented political and social changes. They think of Studia Politica. Romanian Political Science Review as a challenge and a mandate to be involved in scholarly issues of fundamental importance, related not only to the democratization of Romanian polity and politics, to the “great transformation” that is taking place in Central and Eastern Europe, but also to the make-over of the assumptions and prospects of their discipline. They hope to be joined in by those scholars in other countries who feel that the demise of communism calls for a new political science able to reassess the very foundations of democratic ideals and procedures.
    [Show full text]
  • The Autonomous Surfer
    Renée Ridgway The Autonomous Surfer CAIS Report Fellowship Mai bis Oktober 2018 GEFÖRDERT DURCH RIDGWAY The Autonomous Surfer Research Questions The Autonomous Surfer endeavoured to discover the unknown unknowns of alternative search through the following research questions: What are the alternatives to Google search? What are their hidden revenue models, even if they do not collect user data? How do they deliver divergent (and qualitative) results or knowledge? What are the criteria that determine ranking and relevance? How do p2p search engines such as YaCy work? Does it deliver alternative results compared to other search engines? Is there still a movement for a larger, public index? Can there be serendipitous search, which is the ability to come across books, articles, images, information, objects, and so forth, by chance? Aims and Projected Results My PhD research investigates Google search – its early development, its technological innovation, its business model of the past 20 years and how it works now. Furthermore, I have experimented with Tor (The Onion Router) in order to find out if I could be anonymous online, and if so, would I receive diver- gent results from Google with the same keywords. For my fellowship at CAIS I decided to first research search engines that were incorporated into the Tor browser as default (Startpage, Disconnect) or are the default browser now (DuckDuckGo). I then researched search engines in my original CAIS proposal that I had come across in my PhD but hadn’t had the time to research; some are from the Society of the Query Reader (2014) and others I found en route or on colleagues’ suggestions.
    [Show full text]
  • About Garlic and Onions a Little Journey…
    About Garlic and Onions A little journey… Tobias Mayer, Technical Solutions Architect BRKSEC-2011 Cisco Webex Teams Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Events Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space BRKSEC-2011 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 About Garlic and Onions We are all looking for privacy on the internet, for one or the other reason. This Session is about some technologies you can use to anonymise your network traffic, such as Tor (The Onion Router). The first part will give an introduction and explain the underlaying technology of Tor. We will take look at how you can not only use the Tor browser for access but also how the Tor network is working. We will learn how you can establish a Tor session and how we can find hidden websites and give examples of some websites...So we will enter the Darknet together. Beside Tor, we will also take a quick look at other techniques like I2P (Garlic Routing). In the last section we will make a quick sanity check what security technologies we can use to (maybe) detect such traffic in the network. This presentation is aimed at everyone who likes to learn about anonymization techniques and have a little bit of fun in the Darknet. BRKSEC-2011 © 2020 Cisco and/or its affiliates. All rights reserved.
    [Show full text]
  • BRKSEC-2011.Pdf
    #CLUS About Garlic and Onions A little journey… Tobias Mayer, Technical Solutions Architect BRKSEC-2011 #CLUS Me… CCIE Security #14390, CISSP & Motorboat driving license… Working in Content Security & TLS Security tmayer{at}cisco.com Writing stuff at “blogs.cisco.com” #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Agenda • Why anonymization? • Using Tor (Onion Routing) • How Tor works • Introduction to Onion Routing • Obfuscation within Tor • Domain Fronting • Detect Tor • I2P – Invisible Internet Project • Introduction to Garlic Routing • Conclusion #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#BRKSEC-2011 by the speaker until June 18, 2018. #CLUS © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Different Intentions Hide me from Government! Hide me from ISP! Hide me from tracking! Bypass Corporate Bypass Country Access Hidden policies restrictions (Videos…) Services #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Browser Identity Tracking does not require a “Name” Tracking is done by examining parameters your browser reveals https://panopticlick.eff.org #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Proxies EPIC Browser #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates.
    [Show full text]
  • Unveiling the I2P Web Structure: a Connectivity Analysis
    Unveiling the I2P web structure: a connectivity analysis Roberto Magan-Carri´ on,´ Alberto Abellan-Galera,´ Gabriel Macia-Fern´ andez´ and Pedro Garc´ıa-Teodoro Network Engineering & Security Group Dpt. of Signal Theory, Telematics and Communications - CITIC University of Granada - Spain Email: [email protected], [email protected], [email protected], [email protected] Abstract—Web is a primary and essential service to share the literature have analyzed the content and services offered information among users and organizations at present all over through this kind of technologies [6], [7], [2], as well as the world. Despite the current significance of such a kind of other relevant aspects like site popularity [8], topology and traffic on the Internet, the so-called Surface Web traffic has been estimated in just about 5% of the total. The rest of the dimensions [9], or classifying network traffic and darknet volume of this type of traffic corresponds to the portion of applications [10], [11], [12], [13], [14]. Web known as Deep Web. These contents are not accessible Two of the most popular darknets at present are The Onion by search engines because they are authentication protected Router (TOR; https://www.torproject.org/) and The Invisible contents or pages that are only reachable through the well Internet Project (I2P;https://geti2p.net/en/). This paper is fo- known as darknets. To browse through darknets websites special authorization or specific software and configurations are needed. cused on exploring and investigating the contents and structure Despite TOR is the most used darknet nowadays, there are of the websites in I2P, the so-called eepsites.
    [Show full text]
  • Women in Power A-Z of Female Members of the European Parliament
    Women in Power A-Z of Female Members of the European Parliament A Alfano, Sonia Andersdotter, Amelia Anderson, Martina Andreasen, Marta Andrés Barea, Josefa Andrikiené, Laima Liucija Angelilli, Roberta Antonescu, Elena Oana Auconie, Sophie Auken, Margrete Ayala Sender, Inés Ayuso, Pilar B Badía i Cutchet, Maria Balzani, Francesca Băsescu, Elena Bastos, Regina Bauer, Edit Bearder, Catherine Benarab-Attou, Malika Bélier, Sandrine Berès, Pervenche Berra, Nora Bilbao Barandica, Izaskun Bizzotto, Mara Blinkevičiūtė, Vilija Borsellino, Rita Bowles, Sharon Bozkurt, Emine Brantner, Franziska Katharina Brepoels, Frieda Brzobohatá, Zuzana C Carvalho, Maria da Graça Castex, Françoise Češková, Andrea Childers, Nessa Cliveti, Minodora Collin-Langen, Birgit Comi, Lara Corazza Bildt, Anna Maria Correa Zamora, Maria Auxiliadora Costello, Emer Cornelissen, Marije Costa, Silvia Creţu, Corina Cronberg, Tarja D Dăncilă, Vasilica Viorica Dati, Rachida De Brún, Bairbre De Keyser, Véronique De Lange, Esther Del Castillo Vera, Pilar Delli, Karima Delvaux, Anne De Sarnez, Marielle De Veyrac, Christine Dodds, Diane Durant, Isabelle E Ernst, Cornelia Essayah, Sari Estaràs Ferragut, Rosa Estrela, Edite Evans, Jill F Fajon, Tanja Ferreira, Elisa Figueiredo, Ilda Flašíková Beňová, Monika Flautre, Hélène Ford, Vicky Foster, Jacqueline Fraga Estévez, Carmen G Gabriel, Mariya Gál, Kinga Gáll-Pelcz, Ildikó Gallo, Marielle García-Hierro Caraballo, Dolores García Pérez, Iratxe Gardiazábal Rubial, Eider Gardini, Elisabetta Gebhardt, Evelyne Geringer de Oedenberg, Lidia Joanna
    [Show full text]
  • The Onion Crate - Tor Hidden Service Index Protected Onions Add New
    onion.to does not host this content; we are simply a conduit connecting Internet users to content hosted inside the Tor network.. onion.to does not provide any anonymity. You are strongly advised to download the Tor Browser Bundle and access this content over Tor. For more information see our website for more details and send us your feedback. hide Tor2web header Online onions The Onion Crate - Tor Hidden Service Index Protected onions Add new nethack3dzllmbmo.onion A public nethack server. j4ko5c2kacr3pu6x.onion/wordpress Paste or blog anonymously, no registration required. redditor3a2spgd6.onion/r/all Redditor. Sponsored links 5168 online onions. (Ctrl-f is your friend) A AUTOMATED PAYPAL AND CREDIT CARD MARKET 2222bbbeonn2zyyb.onion A Beginner Friendly Comprehensive Guide to Installing and Using A Safer yuxv6qujajqvmypv.onion A Coca Growlog rdkhliwzee2hetev.onion ==> https://freenet7cul5qsz6.onion.to/freenet:USK@yP9U5NBQd~h5X55i4vjB0JFOX P97TAtJTOSgquP11Ag,6cN87XSAkuYzFSq-jyN- 3bmJlMPjje5uAt~gQz7SOsU,AQACAAE/cocagrowlog/3/ A Constitution for the Few: Looking Back to the Beginning ::: Internati 5hmkgujuz24lnq2z.onion ==> https://freenet7cul5qsz6.onion.to/freenet:USK@kpFWyV- 5d9ZmWZPEIatjWHEsrftyq5m0fe5IybK3fg4,6IhxxQwot1yeowkHTNbGZiNz7HpsqVKOjY 1aZQrH8TQ,AQACAAE/acftw/0/ A Declaration of the Independence of Cyberspace ufbvplpvnr3tzakk.onion ==> https://freenet7cul5qsz6.onion.to/freenet:CHK@9NuTb9oavt6KdyrF7~lG1J3CS g8KVez0hggrfmPA0Cw,WJ~w18hKJlkdsgM~Q2LW5wDX8LgKo3U8iqnSnCAzGG0,AAIC-- 8/Declaration-Final%5b1%5d.html A Dumps Market
    [Show full text]
  • – Ngi – the People Building the Internet of Tomorrow
    – NGI – THE PEOPLE BUILDING THE INTERNET OF TOMORROW April 2020 NGI.eu The Next Generation Internet community is an incredibly talented group of people whose combined efforts are creating a human- centric Internet. With NGI, researchers and innovators run projects throughout Europe in a diverse array of subject areas from cryptography to federated identity and from search technology to secure operating systems. NGI comprises an ambitious research and innovation programme with more than €250 million EC funding between 2018-2020. Too often top Internet innovators are not associated with European funding because of perceived high barriers to entry. NGI has put in place the mechanisms to ensure that it attracts top talent by offering funding opportunities for accessible, small, focused and agile projects. €75 million directly support top Internet researchers and innovators through ‘cascade funding’ with simplified administrative procedures and a light, start-up and SME friendly application scheme. Read more about NGI’s expertise to select, fund mentor and coordinate next generation Internet projects. NGI equity-free funding offers innovators such as SMEs and start-ups a buffering opportunity, with vital resources to develop their innovative solutions. Each project receives an NGI grant, typically €50,000 – 200,000, which can significantly shorten the research cycle and time to market. Moreover, the NGI initiative bestows bridging opportunities facilitating inter-organizational networks, collaborations and the flow of knowledge and resources across organisations. NGI.eu 1 BLOCKCHAIN NGI funds projects on blockchain, peer-to-peer technology and decentralised ledger technology (DLT) through a Research and Innovation Action named LEDGER. Focus is on a variety of areas including health, economy, mobility, public services, energy and sustainability and open innovation.
    [Show full text]
  • Hijacking Captives
    ess. SEE STORY BELOW Sunny, Cooler Sunny and cooler today. Clear and quite cool tonight. THE FINAL Sunny and cool tomorrow. Bed Bank, Freehold , Loaf Branch (be DeUlU, Pi» ft EDITION Monmouth County's Home Newspaper for 92 Years VOt. 93, NO. 54 RED BANK, N. J., FRIDAY, SEPTEMBER 11, 1970 24 PAGES TEN CENTS Hijacking Captives GENEVA (AP) — Palestinian guerrillas appear to have unacceptable from the humanitarian point of view," it said. agreed to transfer all passengers and crew of the three hi- Meanwhile, the Popular Front called together the 147 jacked" jetliners from the Jordanian desert to Amman, the wqmen and children it had brought to Amman earlier in the International Bed Cross committee reported today. week from the hijacked planes and told them they all Committee President Marcel Navffle said he is "not 100 could leave Amman if they wanted to. per cent sure" of the news, but a message just received from ARAB. STATES JOIN its delegation on the spot indicates that agreement has been readied with the Palestinians. Earlier today the leftists Arab governments of Iraq and Syria joined the West in the campaign to secure the release SET UP DETONATOItS of the approximately 280 airline passengers and crew mem- A few minutes earlier a committee spokesman said bers. Four Western governments and Israel meanwhile re- tile'guerrillas had set up detonators to set off dynamite jected the Palestinians' plans to trade the Israelis among charges attached to the planes, with all the passengers and the hostages for Arab commandos held in Israel. The five crew still aboard.
    [Show full text]
  • A Baker's Dozen of Tips for Be Er Web Searches
    A Baker’s Dozen of Tips for Beer Web Searches Anne Burnett, J.D., M.L.I.S. University of Georgia School of Law Library Athens, Georgia Lawyers use the § ABA Tech Report 2019 web for legal § 90% use free online resources research either regularly or occasionally When to use free resources § If item(s) likely to be freely available § If starting with free & switching to When do subscription for supplemental lawyers use the material will save $$$ web for § If time spent on free doesn’t outweigh research? $$ spent on paid § Recent primary legal information § Government information What is free § Company and directory information web good for? § Information about individuals § Reference information and statistics § Comprehensive sites--collecting all relevant material, from all jurisdictions § High quality, reliable secondary sources What is not § Annotated codes, cases with available? headnotes § Sophisticated citator services, such as Shepard's or KeyCite § Older materials The Tips Use Quotation Marks • Phrase searching • “consumer protection” #1 Can I Quote You? • “John F. Kennedy” • Single word in precise form • “childcare” ≠ “child care” Space = AND Google and Bing recognize OR Minus sign excludes terms • RICO –Puerto #2 • Vikings –football –team Smooth Operators AROUND(x) – proximity operator • John AROUND(2) Kennedy • John F. Kennedy • John Fitzgerald Kennedy • John Kennedy • Kennedy, John F. Limit by • Domain: .edu, .org., .gov, .int, -.com, .de • File type: .pdf, .com, .ppt, .xls • Language #3 • Country Learn Your Limits • Last update
    [Show full text]
  • Motori Di Ricerca E Portali, Dei
    2 Repertorio Il testo è un repertorio di oltre 180 motori di ricerca e portali, dei escluse le piattaforme commerciali come Amazon, iTunes, ecc. motori I motori di ricerca sicuri e consigliati, quali SearX, Qwant, Startpage e DuckDuckGo, sono stati omessi, così come Google (analizzato esclusivamente per il carattere quasi monopolistico), in quanto di Repertorio dei trattati nel volume Motori di ricerca, Trovare informazioni in rete. ricer Strumenti per le ricerche sul web. Il catalogo è articolato per macro-aree tematiche relative alle ca. motori di ricerca possibili ricerche: privacy e sicurezza, tipologia di contenuti e T risultati, musica, video, foto, immagini, icone, eBook, documenti. r ovar Il capitolo primo tratta i motori di ricerca sicuri e a tutela della Trovare informazioni in rete privacy. e Il capitolo secondo riporta i motori di ricerca focalizzati sulla infor Strumenti per le ricerche sul web tipologia di contenuti e risultati. Un esempio sono CC Search, per la ricerca di contenuti multimediali non coperti da copyright, mazioni oppure FindSounds per l’individuazione di suoni in fonti aperte. I capitoli successivi hanno come oggetto le risorse per la ricerca di contenuti documentali e multimediali. Flavio Gallucci in Il capitolo terzo raccoglie le risorse per la ricerca di foto, immagini r e icone. TinEye merita attenzione per la tecnica di reverse image ete. search, ovvero la ricerca a partire dal caricamento di una foto. Strumenti Il capitolo quarto elenca strumenti e risorse per la ricerca di brani musicali, l’ascolto di musica in streaming e l’individuazione di eventi. Il capitolo quinto propone i portali dedicati alla ricerca di video.
    [Show full text]
  • University of Oklahoma Graduate College
    UNIVERSITY OF OKLAHOMA GRADUATE COLLEGE RELEVANCE AND PRIVACY IMPROVEMENTS TO THE YACY DECENTRALIZED WEB SEARCH ENGINE A THESIS SUBMITTED TO THE GRADUATE FACULTY in partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE By JEREMY RAND Norman, Oklahoma 2018 RELEVANCE AND PRIVACY IMPROVEMENTS TO THE YACY DECENTRALIZED WEB SEARCH ENGINE A THESIS APPROVED FOR THE SCHOOL OF COMPUTER SCIENCE BY Dr. Dean Hougen, Chair Dr. Qi Cheng Dr. Sridhar Radhakrishnan © Copyright by JEREMY RAND 2018 This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit https://creativecommons.org/licenses/by-sa/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. \. dedicated to all the people who are out there unfucking the Internet." { Giordano Nanni Historian, Journalist, Founder of The Juice Media, Co-Creator of Juice Rap News. https://www.youtube.com/watch?v=5b5W_U8RBDI Acknowledgements We'd like to thank Ryan Castellucci and midnightmagic for some fascinating and productive discussions regarding anti-Sybil mechanisms. iv Contents Acknowledgements iv Abstract vii 1 Introduction to Decentralized Web Search 1 1.1 Background on Search Engines, Civil Liberties, and Decentralization . 1 1.2 Motivation for Decentralized Web Search ................ 3 1.2.1 Censorship Resistance ...................... 3 1.2.2 Privacy .............................. 3 1.2.3 Decentralization .......................... 4 1.2.4 Transparency ........................... 4 1.2.5 Software Freedom ......................... 5 1.3 Our Contributions to YaCy ....................... 5 2 Related Work 6 2.1 Decentralized Web Search ........................ 6 2.2 Supervised Learning ........................... 7 3 Learning-Related Relevance Improvements 8 3.1 Ranking Transparency .........................
    [Show full text]