28 Matching Annotations
  1. Apr 2024
    1. Privacy is realized by the group founder creating a specialkeypair for the group and secretly sharing the private group key with every new group member.When a member is removed from a group or leaves it, the founder has to renew the group’s keypair

      Have locks on data is a nice idea.

      But given we have dissemination/disclosure among friends only, do we need to encrypt the blocks? Given communication channels are encrypted.

    2. However, by doing so the sender mayreveal additional information through the block’s hash pointers, e.g. the identities of other groupmembers

      Well, when sharing such a block off-group, you may skip transmitting its deps. In Social Networking that may be alright. And when off-group agent gets accepted to group, he's able to get the stuff below.

      However, that does complicate piggybacking, as it'll be seen that the previously off-group agent has some block (but actually he doesn't have its deps).

    3. reserved words

      Perhaps a sort of protobuf is better.

    4. A group creator can invite other agents to become members and remove members atwill.

      Goes against democratic principles.

      A democratic way will be to raise a BAN poll.

    5. Thegrassroots WhatsApp-like protocol WL employs a hypergraph (a graph in which an edge mayconnect any number of vertices). A hyperedge connecting agents 𝑃 ⊂ Π means that the agents in 𝑃are members in a group represented by the hyperedge

      I.e., an edge of a hypergraph is a set of vertices.

      This is akin to a pub/sub topic.

    6. SMS
    7. has an IPaddress

      Multiaddr could be used instead, to aid connectivity

    8. and if located behind a firewall that preventssmartphones from communicating directly,

      Huh, such firewalls exist? I thought they can be hole-punched.

    9. In particular, adeep-fake payload that is not attributed to its source can be promptly filtered as spam

      ^

    10. However, sinceevery block in GSN is signed, when one breaches privacy within the protocol the breach carriestheir signature so the culprit can be identified.

      What stops a culprit to send off-group a message that is not his own? We can only achieve the "culprit detection" by addressing and signing every message we send to A. This is a lot of re-signing. And we won't have a convergent DAG.

    11. Furthermore, each block sent includes the most recent IP address of the sender,allowing agents to keep track of their friend’s changing IP addresses.

      Perhaps better to attach a new IP address to a message once it does change. What's the point in telling over-and-over the same IP?

    12. Every so often, an agent 𝑝sends to every friend 𝑞 every block 𝑝 knows and believes that 𝑞 needs, based on the last blockreceived from 𝑞.

      ^

    13. Agents communicate only with their friends

      More like an edge gives a communication path.

      A->B (A follows B) - B can talk to A.

      A<->B - B can talk to A, A can talk to B.

    14. However, their exclusion is not required in social networking, and hence social networking protocolscan be simpler than payment systems protocols

      I.e., Equivocation exclusion is not required for social networking.

  2. Apr 2022
  3. Dec 2021
  4. Oct 2021
    1. UCL Centre for Behaviour Change. (2021, October 12). The CBC Conference 2021 programme has just been released and is packed with thought-provoking talks, international keynote speakers, symposia, and plenty of networking opportunities and social exchanges for delegates. Register now! Http://tinyurl.com/5xwa7c27 #cbcconf2021 https://t.co/9iZqPjEEY6 [Tweet]. @UCLBehaveChange. https://twitter.com/UCLBehaveChange/status/1447860878511157252

  5. Jul 2021
  6. Feb 2021
  7. Dec 2020
    1. ReconfigBehSci {@SciBeh} (2020) sadly squares with my own impression of social media 'debate' - as someone who works on both argumentation and belief formation across social networks, this strikes me as every bit as big a problem as the spread of conspiracy. Twitter. Retrieved from: https://twitter.com/i/web/status/1308341816333340672

  8. Aug 2020
  9. Jul 2020
  10. Jun 2020
  11. May 2020
  12. Jul 2018
    1. Social scientists measure the strength of these links using a variety of indicators, such as how often a person calls another, whether that call is reciprocated, the time the two people spend speaking, and so on. But these indicators are often difficult and time-consuming to measure.
  13. Jul 2015
    1. Twitter is an "argument machine"

      Maybe annotation could put "tweet" sized things into context and thereby avoid the "argument machine."

      Rashly assuming anyone will actually take time to read the context and the comment...