Connect with us

Op-Ed

Are SJWs Trying to Frame Linux Creator Linus Torvalds With Fake Sexual Assault Charges?

Published

on

Last week open-source software developer and Libertarian activist Eric Raymond published a disturbing post that went viral on the Internet. The post, titled “From kafkatrap to honeytrap,” reports that militant feminist groups and “Social Justice Warriors” (SJWs) are trying to frame Linux kernel creator Linus Torvalds and other high-profile male developers with fake sexual assault charges.

Raymond was informed by a participant in an IRC chat. The identity of the informer hasn’t been revealed, but Raymond says “I have found him both well-informed and completely trustworthy in the past.” Raymond’s conclusion is that there is a deliberately planned and persistent campaign to frame Torvalds. “I have to see it as an an attempt to smear and de-legitimize the Linux community (and, by extension, the entire open-source community) in order to render it politically pliable,” says Raymond. His advice to open-source leaders and developers is:

If you are any kind of open-source leader or senior figure who is male, do not be alone with any female, ever, at a technical conference… because there is a chance that a “women in tech” advocacy group is going to try to collect your scalp.

Normally, unsubstantiated rumors spread by unidentified informants in online chat rooms shouldn’t be taken seriously. In fact, I think the rumor is at least exaggerated. But Raymond’s post went viral through an article published in the very popular political website Breitbart.

“This report is consistent with reports of SJW dezinformatsiya tactics from elsewhere and I think it would be safest to assume that they are being replicated by other women-in-tech groups,” insists Raymond.

SJWs Are Discrediting Social Justice and Making it Ridiculous

SJWs Always LieSJW is a pejorative term used to mock “Social Justice Warriors” that recently exploded in Internet popularity. In his book “SJWs Always Lie: Taking Down the Thought Police,” author Theodore Beale (nicknamed Vox Day) defines SJWs as:

“They are the Social Justice Warriors, the SJWs, the self-appointed thought police who have been running amok throughout the West since the dawn of the politically correct era in the 1990s.”

As I said, I don’t take this rumor seriously. But unconfirmed rumors don’t go viral without deep reasons. In this case, the reason is that Raymond’s post touched an open nerve. Unfortunately, there are more and more disturbing cases of political correctness run dangerously amok in the tech world. Last year, there was the ridiculous “bullshirtstorm.” A few months ago GitHub, the repository hosting service used by many open source software projects, proposed to adopt a code of conduct that explicitly endorsed “reverse” racism and sexism. The project was paused after a wave of outraged reactions, but interestingly Github never clearly admitted that the project is on hold.

SJWs are being ridiculed all over the Internet after the recent episodes of politically correct intolerance and mobbing in university campuses in the UK and the US. Even the popular TV show South Park is mocking and ridiculing SJWs.

I find the SJWs very annoying. But they are also dangerous, because they are making social justice – the hard-won policies of equal opportunity for everyone regardless of their ethnicity, gender, and sexual orientation – ridiculous, and giving the high moral ground to the real enemies of social justice. I don’t like Vox Day and Breitbart – please don’t let them be right.

The fundamentalist identity politics of SJWs is menacing the rights – won with blood – to free speech and free thought, creating social tensions, and pushing social tensions to the breaking point where bad things, like fake criminal charges or worse, could really happen.

Images from Shutterstock and Wikimedia Commons.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Giulio Prisco is a freelance writer specialized in science, technology, business and future studies.




Feedback or Requests?

Click to comment

You must be logged in to post a comment Login

Leave a Reply

Decentralization

Cache Me If You Can: Crypto Trading, Decentralized

Published

on

Spot exchanges, over-the-counter/OTC trading desks, and futures contracts would likely rank amongst the most popular methods for trading cryptocurrencies between two or more parties.

Despite their popularity though, most of these trading venues utilise centralised infrastructure in at least one area of their operations.

When combined with the endemic security threats which crypto trading services regularly face: centralized fundamental functions are a considerable threat to users who value the privacy of their transactions.

“A Peer-to-Peer Electronic Cash System”

Cryptocurrency is still a burgeoning industry, with the number of ICOs and market investment having increased by several multiples even just over the past eight months when compared to the whole of 2017.

Despite this: concerning conventions have already established themselves that challenge the original vision prescribed by Satoshi Nakamoto for Bitcoin.

The enigmatic Satoshi Nakamoto became a legend upon publication of his seminal cryptocurrency white-paper entitled ‘Bitcoin: A Peer-to-Peer Electronic Cash System’ (and if you haven’t read it, you really should!).

Since then, the document has served as an conceptual blueprint which has been referenced by a great number of subsequent altcoins: evident by the widespread implementation of Bitcoin’s core mechanics. An example of this is has come to be known as cryptocurrency mining, or the ‘Proof of Work’ consensus algorithm.

P2P vs  P2intermediary2P?

Peer-to-peer (P2P) denotes transactions that are made between two parties without the need for an intermediary to facilitate or authorise the trade.

Mike Orcutt, associate editor at the MIT Technology Review wrote in April 2018 that:

“The whole point of using a blockchain is to let people—in particular, people who don’t trust one another—share valuable data in a secure, tamperproof way…

“One supposed security guarantee of a blockchain system is ‘decentralization.’ If copies of the blockchain are kept on a large and widely distributed network of nodes, there’s no one weak point to attack, and it’s hard for anyone to build up enough computing power to subvert the network”

Whilst this is true for many blockchains and their associated blocks for decentralized cryptocurrencies: most middle-man’ who process trades and transaction utilise a centralised system known as an ‘order book’ upon which future transaction and trade values are calculated.

In June 2009, mere months after Nakamoto’s Bitcoin paper was released to the world, a cross-departmental team from Stanford University published a related and highly recommended investigation into the contemporary status of the order-book.

The authors state that:

“most markets are order-driven, where any market participant is free to provide liquidity by submitting a buy or sell order. Submitted orders are amalgamated by price to create a limit order book. The[re is a] rule driven execution of orders in these limit order books and [also] extensive data that is available for order driven markets.”

With  a centralised order-boook; all the data pertaining to transactions: such as receiver and sender addresses, value of tokens, and dates could be all-but-publicly accessible in the case of a hack or successful unwanted intrusion.

Peer-to-Peer Trading: What Can Be Done?

One solution which we have seen numerous examples of are organisations which claim to be ‘decentralized exchanges’.

On the 9th of August 2018, for example, well-known yet controversial ex-China based cryptocurrency exchange Binance launched a pre-alpha build of their highly anticipated decentralized exchange which they call ‘DEX’.

Conversely, Binance has been subject to more than their fair share of negative press and public feedback as of late and earning trust for their future projects will be no easy feat. They have to contend with hackers, pundits, and a 5.9/10 ranking on Trustpilot.

Another notable release comes from blockchain development platform Stratis, a competitor to Ethereum’s ‘platform for platforms’ and ranked in 50th place on CoinMarketCap as of writing.

The ‘Breeze Wallet with Breeze Privacy Protocol’ launched on the 1st August 2018, and it is a means of facilitating pure peer-to-peer, user-to-user, fully decentralized transactions. As a result, Breeze hopes to introduce centralized intermediaries to the realm of obsolescence, by way of a token-tumbling protocol called ‘TumbleBit’.

If you know of any more projects which have been making recent progress – please let us know in the comments section!

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.4 stars on average, based on 7 rated posts




Feedback or Requests?

Continue Reading

Op-Ed

Disrupting the Cloud: ANKR Network

Published

on

By

Since the creation of bitcoin and the introduction of the “Proof of Work” (POW) algorithm, many have been concerned about the vast use of computing power and energy and their negative side effects. Currently, cloud computing is projected to be a trillion dollar market, yet it is monopolized by some of the largest tech conglomerates in the world. Only giants in the likes of Amazon Web Services and Google Cloud can afford the high human capital cost and upfront server costs to run a successful cloud operation that spans the globe. However, the aforementioned companies tend to charge the customer with a higher margin of cost.

New developments in blockchain technology aim to resolve these issues by improving the efficiency and effectiveness of cloud computing. Being an innovative solution to this computing and consumer problem, Ankr Network brings the benefits of decentralization to cloud computing and balances value between buyers and sellers via crypto economics, Oracle service and distributed computing.

Ankr Network

Ankr Network is an innovative platform, which aims to create a resource-efficient blockchain architecture for a distributed cloud computing system and an easy-to-use infrastructure for the building of business applications. Ankr is the first cloud computing solution to leverage both blockchain and trusted hardware of Intel SGXs. The SGX hardware will allow developers of applications to protect data from unauthorized access and modification and preserve the confidentiality and integrity of information.

Technical solutions include:

  • Consensus Algorithm Proof of Useful Work (PoUW)
  • Platform for distributed cloud computing (DCC)
  • Oracle integrated service
  • Structural support for sidechains

The consensus looks like this:

Anrk upgrades mining with its consensus “Proof of Useful Work” (PoUW), which provides a sustainable block structure. Specifically, PoUW directs power and computing capacity which was used on hashes in POW algorithms such as bitcoin for processing tasks provided by businesses and consumers on the blockchain. Therefore, one can say Ankr upgrades mining to a higher level, allowing equipment holders to receive a financial incentive for block creation and real-world tasks processing.

To explain this better, consider the following: the golden standard algorithm is one where the nodes on the blockchain require:

1) That tasks performed to solve problems is actually quantifiable work;

2) That the processing of these tasks provides some form of value to any party on the network

The Ankr Network appears capable of achieving this gold standard. Alternatively, existing POW in networks such as bitcoin and Ethereum only achieve the first point – nodes use computing power and energy to prove that work was done (but such amount of work is wasted without any utility).

Ankr solves this key technical limitation in bitcoin and Ethereum by including a second point in its consensus algorithm, thus making all the work done by nodes directed on the processing of tasks that could bring added value utility to the network participants.

Ethereum processes all smart contracts on one chain in a serial sequence, which bottlenecks throughput and dramatically reduces the usability, especially when there are large contracts with complicated data on the chain. Plasma is a protocol to solve the scalability issue by building a tree structure of blockchains, where various application chains (Child or Plasma Chains) are connected to a single root chain (Main Chain). Plasma chains can allow applications to handle their specific smart contracts transactions on side chains, thus balancing potential overload of the network.

The efficiency of the main chain can be significantly improved by offloading a number of transactions from the main chain to Plasma chains, especially if proper incentives are given to Plasma operators. Currently, Oracle solutions exist separately from the blockchain framework and are limited in compatibility. Ankr proposes a user-friendly universal AP (application programming interface) I for each child chain to connect to off-chain entities. Existing business can build decentralized autonomous applications on the child chain with powerful computing power and native data feed service provided by the main chain.

 

The Native Oracle (NOS) service provides an authenticated data feed by using both cryptographic primitives and a trusted execution environment (TEE). Thanks to a standardized API for transferring data from existing data sources like websites, NOS allows customers to simplify business in the real world. Basically, this means that blockchain can allow integrating smart contract execution with data sources through a protected gateway.

Intel SGX

Intel SGX (Software Guard Extensions) is a new set of instructions that permits execution of an application inside a hardware enclave, which protects the application’s integrity and confidentiality against certain forms of hardware and software attacks, including hostile operating systems. This lowers entry barriers for miners and provides security and privacy.

Distributed Cloud Computing (DCC) Platform

As internet technology advances, massive amounts of data including text, audio, video, etc. have been created. However, most of this data is neither organized nor relevant to each other. Processing the data in a serial sequence (traditional blockchain) becomes less and less resource efficient and can’t be tolerated by the rapid velocity of business development.

Ankr overcomes these shortcomings through its DDC platform, which enables P2P transactions. Miners will provide their computing power to support the blockchain, as well as sending surplus power for cloud computing calculations.

A P2P network allows application owners and individual users (i.e., requesters) to rent computing power from other users (suppliers). Currently, the cloud computing resources in popular blockchain networks such as bitcoin or Ethereum are exclusively controlled by the centralized cloud service providers and are subject to rigid operation models. A decentralized cloud computing platform can incorporate a blockchain-based payment system, which can allow for direct payment among operators (requesters), sellers (suppliers) and software developers.

Now, we will cover what other projects in this field are doing in comparison to Ankr as a reference project.

Golem

Users of Golem are only incentivized for cloud computing and Golem is using third party computing containers like Docker.

SONM

This project is very similar to Golem, but with a different application field. Golem is focused on rendering, but SONM is focused on the adoption of existing architectures (currently server hosting).

IExec

This project is also similar to Golem and SONM, but its application focus is decentralized cloud computing in specific research applications.

In comparison with the projects above, users of Ankr have different incentives that come from mining, transaction (or smart contract) and cloud computing. Also, Ankr does not use third party platforms for computational power; instead, it uses the computing power of miners.

In my opinion, an additional limitation of Golem, SONM, and IExec is that they have based their development on traditional computing architectures, which are used in data centers, thus limiting their potential computing power and scope of tasks. The reason lies in the fact that data center architecture is working on one technical parameter, which is not optimal for distributed computing where the topology of each device changes frequently and will result in a costly overhead in data transfer and decrease the stability of the network. Ankr technology allows bypassing such limitations, which results in a wider applicability and scope of their network.

Overall, if the Ankr network team can create a network that uses PoUW to reach consensus by applying all the computational energy to useful use and not wasting it, then cloud computing services as Amazon Web, Google Cloud and Microsoft Azure are likely to face serious competition soon.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
1 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 5 (1 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.9 stars on average, based on 9 rated postsVladislav Semjonov has a legal and financial background. He has been involved in crypto space since early 2017 in both ICO advising positions in several ICO consultancy firms, and as an ICO analyst for VC. He began contributing for Hacked.com in April 2017.




Feedback or Requests?

Continue Reading

Op-Ed

Our Review of the MJAC CryptoCompare Summit in London, UK (13 June 2018)

Published

on

Disclaimer: This was my first attendance at such an event since beginning my career as a professional and independent cryptocurrency and /or blockchain journalist.

 I am not affiliated with the event organisers nor do I know them personally, and the same goes for all organisations in attendance as of the time of writing.

[official photographs here]

Earlier this month, I attended the ‘MJAC CryptoCompare Blockchain Summit’ and concluded that the best approach would be to cover the event in a candid matter.

There weren’t any scandals or controversies to speak of. What we mean by this is that this piece intends to cover the greatest pros and cons of the event, in hindsight (which was organised and executed by CryptoCompare in collaboration with MJAC).

First off, MJAC (AKA InvestorsHub) is an organisation that you aren’t likely to have heard of. They are the events and conferences arm of ADVFN, a prominent financial services organisation. Many of the same people responsible for the successful ‘Marijuana Annual Conference’ were also behind the conference in question, hence the acronym ‘MJAC’.

Many of you should be fully aware of CryptoCompare. They are arguably one of the most utilised data resources for up-to-date and historical data on market trends, respective per-coin values, and overall trade volume.

Location and Venue

The days proceedings took place at a venue called ‘Old Billingsgate’.

It’s a listed building which features a combination of historical architecture with modern internal fittings and is located close to Monument tube station. Its name derives from the nearby historic Old Billingsgate Market area.

The choice of venue couldn’t have been much better thanks in part to the location’s iconic and unobstructed view across the Thames River: including the Tower of London in clear sight, plus The Shard being mostly-visible nearby.

Old Billingsgate benefits from being highly accessible to attendees and participants due to its central location, however this is where the positive words I have for the venue start to run dry.

The aesthetic was great, and photographs show a busy yet not overpopulated show floor. The show started with a similar number as represented for most of the day, but later in the day the floor became packed and somewhat claustrophobic.

This atmosphere wasn’t helped by the fact that the space here felt both condensed and underutilised at the same time, with all the stalls leaving small hallways to brush past other visitors.

Conversely, over half of the two stories of open areas in the venue were dedicated to two theatre spaces, one large and one small. These rooms were well arranged and hosted all the one-day summit’s speakers and panelists.

Speeches and Panels

Speakers and individual panel attendees of course were responsible for many of the day’s highlights, as well as the presence of a combination of established and up-and-coming companies/ICOs.

Vitaly Kedyk (Executive Director of CEX.IO) and Claire Wells (Director of Legal & Business Affairs for EMEA at Circle) were two of the events strongest performers, whilst other notable speakers & panellists included representatives from CoinFloor, Ripple, BlockEx, and Coinbase – to name a few.

Unfortunately, not all panellists seemed to be ideal matches for such discussions. A couple that I attended, for example, featured a combination of experts whose interactions were often close to non-existent with each other. What’s more, top participants were easily distinguished by their contribution of valuable insights and answers than their peers in some circumstances.

Organisation and execution of the event overall is something to be lauded. Every speech and panel I saw started and finished with perfect timing, suggesting a great approach to planning. There was also a great atmosphere amongst participants and all I spoke to.

Success or Failure?

The qualification and quantification of any event’s success or failure should arguably be defined in several ways. Cryptocurrency is still growing as an industry (despite what the market tracking values may indicate), which gives us less of a general standard against which to measure them.

One way we can still utilise though, is to measure its performance in hindsight and considering the organisers’ own stated ambitions / agenda.

“The pace of development in the crypto space has rapidly picked up in the past year and it Is now more important than ever to gather the top thought leaders to showcase progress and discuss challenges. MJAC will give customers, investors, and regulators a chance to glimpse into the future direction of this exciting new industry.”Charles Hayter, CryptoCompare.

This quote was taken from the first page of a complimentary guide that was available to all attendees.

It came along with a free book (‘CryptoAssets’ by Chris Burniske and Jack Tatar), which is honestly not bad as a beginners and intermediate level guide aimed primarily at non-technical crypto enthusiasts.

For all intents and purposes, the organisation achieved their stated goal to a degree, however the sequel had better be much more impressive to excuse the lack of experience on British soil (one of the largest crypto economies in Europe, and arguably one of if not the financial capital).

A Relative Conclusion

The second and final way (that we will discuss here) you can measure such an event is through comparison to other events, which are popping up around the world as well as within London alone despite market indicators.

One of these is the similarly titled ‘Blockchain Summit London 2018’. It is set to be a much larger event: boasting approximately 2,500 attendees and over 150 speakers.

It also costs approximately £400 for the two-day event and is set in the well-known Olympia venue in Kensington, West London. Taking place just a couple of weeks after the MJAC CryptoCompare conference.

MJAC CryptoCompare Blockchain Summit was the first event held by these event organisers about cryptocurrency in London. On that end: it is not entirely fair to consider it an equal comparison with this rival, especially when tickets were the relatively low price of £100.

Despite this I can’t help but admit that I was perhaps expecting more from this ‘summit’, if not a little too much.

7/10

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.4 stars on average, based on 7 rated posts




Feedback or Requests?

Continue Reading

5 of 15 Seats Available

Learn more here.

Recent Comments

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending