648 research outputs found
A Voice for the Voiceless: Peer-to-peer Mobile Phone Networks for a Community Radio Service
We propose a new application for mobile ad-hoc networks (MANETs) – community radio. We argue how MANETS help overcome important limitations in how community radio is currently operationalized. We identify critical design elements for a MANET based community radio service and propose a broad architecture for the same. We then investigate a most critical issue– the choice of the network wide broadcast protocol for the audio content. We identify desired characteristics of a community radio broadcasting service. We choose and evaluate eight popular broadcasting protocols on these characteristics, to find the protocols most suited for our application.
Political artifacts and personal privacy : the Yenta multi-agent distributed matchmaking system
Thesis (Ph.D.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 1999.Includes bibliographical references (p. 119-128).Technology does not exist in a social vacuum. The design and patterns of use of any particular technological artifact have implications both for the direct users of the technology, and for society at large. Decisions made by technology designers and implementors thus have political implications that are often ignored. If these implications are not made a part of the design process, the resulting effects on society can be quite undesirable. The research advanced here therefore begins with a political decision: It is almost always a greater social good to protect personal information against unauthorized disclosure than it is to allow such disclosure. This decision is expressly in conflict with those of many businesses and government entities. Starting from this premise, a multi-agent architecture was designed that uses both strong cryptography and decentralization to enable a broad class of Internet-based software applications to handle personal information in a way that is highly resistant to disclosure. Further, the design is robust in ways that can enable users to trust it more easily: They can trust it to keep private information private, and they can trust that no single entity can take the system away from them. Thus, by starting with the explicit political goal of encouraging well-placed user trust, the research described here not only makes its social choices clear, it also demonstrates certain technical advantages over more traditional approaches. We discuss the political and technical background of this research, and explain what sorts of applications are enabled by the multi-agent architecture proposed. We then describe a representative example of this architecture--the Yenta matchmaking system. Yenta uses the coordinated interaction of large numbers of agents to form coalitions of users across the Internet who share common interests, and then enables both one-to-one and group conversations among them. It does so with a high degree of privacy, security, and robustness, without requiring its users to place unwarranted trust in any single point in the system.by Leonard Newton Foner.Ph.D
Fundamentals of the network neutrality debates
The Network Neutrality debate is a complicated one because of the dramatic impact of networks, mainly the Internet, on people’s lives. Therefore, concepts like innovation, decentralized networks, social and political aspects need to be analyzed to have a better understanding of the fundamentals of the debate
The Courier, Volume 4, Issue 4, October 8, 1970
Stories:
ASB Wants Hand in Selecting Dean
Many 2 Ss Expire Soon, Renew Now (Draft)
Student Aid Sought in Cluster Study
Senate Weighs Its Powers
Instructor in Ecuador Walks into Riot
Horse Care Begins Oct. 29
Phase 1 Work Progressing
People:
Nancy Alumbaugh
Debbie Duepnee
Fred Robinson
Adade Wheeler
Gordon Kraft
Craig Cardell
TEEvil: Identity Lease via Trusted Execution Environments
We investigate identity lease, a new type of service in which users lease
their identities to third parties by providing them with full or restricted
access to their online accounts or credentials. We discuss how identity lease
could be abused to subvert the digital society, facilitating the spread of fake
news and subverting electronic voting by enabling the sale of votes. We show
that the emergence of Trusted Execution Environments and anonymous
cryptocurrencies, for the first time, allows the implementation of such a lease
service while guaranteeing fairness, plausible deniability and anonymity,
therefore shielding the users and account renters from prosecution. To show
that such a service can be practically implemented, we build an example service
that we call TEEvil leveraging Intel SGX and ZCash. Finally, we discuss defense
mechanisms and challenges in the mitigation of identity lease services.Comment: 21 pages, 5 figure
- …