Deep learning pioneer Geoffrey Hinton receives prestigious Royal Medal from the Royal Society – University of Toronto

The University of Torontos Geoffrey Hinton has been honoured withthe Royal Societysprestigious Royal Medal for his pioneering work in deep learning a field of artificial intelligence that mimics the way humans acquire certain types of knowledge.

TheU.K.s national academy of sciencessaid it is recognizing Hinton,a University Professor Emeritus in the department of computer science in the Faculty of Arts & Science, for pioneering work on algorithms that learn distributed representations in artificial neural networks and their application to speech and vision, leading to a transformation of the international information technology industry.

Its the latest in along list of accolades for Hinton, who is alsochief scientific adviser at theVector Institute for Artificial Intelligenceand a vice-president and engineering fellow at Google. Others includethe Association for Computing Machinerys A. M. Turing Award, widely considered the Nobel Prize of computing.

It is a great honour to receive the Royal Medal a medal previously awarded to intellectual giants like Darwin, Faraday, Boole and G.I. Taylor, Hinton says.

But unlike them, my success was the result of recruiting and nurturing an extraordinarily talented set of graduate students and post-docs who were responsible for many of the breakthroughs in deep learning that revolutionized artificial intelligence over the last 15 years.

Royal Medalshave been awarded annually since 1826 for advancements in the physical and biological sciences. A third medal for applied sciences has been awarded since 1965.

Previous U of T winners of the Royal Medalinclude Anthony Pawson andNobel Prize-winner John Polanyi.

Hinton, meanwhile,has been a Fellow of the Royal Society since 1998 and a Fellow of the Royal Society of Canada since 1996.

The Royal Medal is one of the most significant acknowledgements of an individuals research and career, says Melanie Woodin, dean of the Faculty of Arts & Science. And Professor Hinton is truly deserving of the distinction for his foundational research and for the exceptional contribution hes made toward shaping the modern world and the future. I am thrilled to congratulate him on this award.

I want to congratulate Geoff on this spectacular achievement, adds Eyal de Lara, chair of the department of computer science. We are very proud of the seminal contributions he has made to the field of computer science, which are fundamentally reshaping our discipline and impacting society at large.

Deep learning is a typeof machine learningthat relies on a neural network modelled on the network of neurons in the human brain. In 1986, Hinton and his collaborators developed the breakthrough approach based on the backpropagation algorithm, a central mechanism by which artificial neural networks learn that would realize the promise of neural networks and form the current foundation of that technology.

Hinton and his colleagues in Toronto built on that initial work with a number of critical developments that enhanced the potential of AI and helped usher in todays revolution in deep learning with applications in speech and image recognition, self-driving vehicles, automated diagnosis of images and language, and more.

I believe that the spectacular recent progress in large language models, image generation and protein structure prediction is evidence that the deep learning revolution has only just started, Hinton says.

Go here to see the original:
Deep learning pioneer Geoffrey Hinton receives prestigious Royal Medal from the Royal Society - University of Toronto

Is This The Oldest Open Source HVAC Project In Existence? – Hackaday

Homebrew HVAC systems are one of those projects that take such a big investment of time, effort and money that youve got to be a really dedicated (ideally home-owning) hacker with a wide variety of multidisciplinary skills to pull off an implementation that can work in reality. One such HVAC hacker is [Vadim Tkachenko] with his multi-zone Home Climate Control (HCC) project that we covered first back in 2007. We now have rare opportunity to look at the improvements fifteen years of part-time development can produce, when a project is used all day, all year round in their own home. At the start, things were simple, just opening and closing ventilators with none of those modern MQTT-driven cloud computing stuff.

The current implementation, called DZ (GitHub project link) has been rewritten using modern reactive programming techniques (which apparently is a good thing for an HVAC control system) with the HCC-core application running on anything UNIX, but fits nicely on the Raspberry Pi. Measurement data (temperature, humidity, etc.) can be taken from 1-wire devices as well as XBee modules, enabling wired and wireless sensing around the installation. The system can control various air management appliances, such as heaters, heat pumps and fans depending on the need for heating, cooling or ventilation. Dont forget that often neglected third leg of HVAC, the V part is critical for a healthy house. The remote control and monitoring is courtesy of an Android application (HCC-Remote) which allows users to visualise the current status and what the HCC is currently doing to keep the programmed climate in check.

Data are transported using the common MQTT protocol, allowing simple connectivity to any sensors or controllers that already exist in an installation, with HCC providing integrations for ESPHome as well as Home Assistant, so there are plenty of options for building a system around existing hardware. The project is fairly big (as youd expect for this length of time) but [Vadim] would like to stress that they see a lot of re-inventing of the wheel on this subject, and a good look at HCC may save some people a lot of pain implementing a system without such a solid grounding.

If your needs are more basic, perhaps this simple ESP8266-based smart vent will suffice? And, if the control system is less of a problem, and youre more interested in the actual physical implementation, why not check out this DIY Energy Recovery Ventilator (ERV) project?

The rest is here:
Is This The Oldest Open Source HVAC Project In Existence? - Hackaday

What is Solana Firedancer and why is it important? – Geeks World Wide

Originally posted here.By: Az

Jump Crypto and the Solana Foundation have announced their plans to boost the throughput and reliability of the high-performance blockchain Solana. This will be done by developing a new open-source validator client for the network that will run alongside the existing one. Its name [] Firedancer. Firedancer is now Were excited about the opportunity []

Jump Crypto and the Solana Foundation have announced their plans to boost the throughput and reliability of the high-performance blockchain Solana. This will be done by developing a new open-source validator client for the network that will run alongside the existing one.

Its name [] Firedancer .

Firedancer is now

Were excited about the opportunity to help scale the Solana network by engaging our strong-arm in research and development. https://t.co/5wtlghONPG pic.twitter.com/WPRyJN7ior

jump_crypto (@jump_) August 16, 2022

Jump Crypto, which has always been a validator and RPC node operator within the Solana ecosystem, will not only create a second validator client, separate from the one originally built by Solana Labs but also propose important upgrades to Solanas existing open-source core software. Kevin Bowers, Jump Tradings Chief Science Officer, will oversee the process of building the new validator client.

But what is Firedancer, what does it do, and what will it achieve?

Lets take a look!

What is Firedancer?

Firedancer is a new validator client that has been built by Jump Crypto to help increase the efficiency of the Solana network.

It is a fully independent consensus node implementation for the Solana blockchain. A consensus node is the core piece of technology that validators use to agree on the chains state (blocks and transactions) ensuring its integrity and validity.

What does it do?

Currently, Solanas throughput is not limited by any hardware, but instead by software inefficiencies. This is what Firedancer looks to solve, in the process enhancing both the networks decentralisation and its performance drastically.

The truth is that there is one fatal flaw with some PoS consensus methods, and that issue is having the network overthrown by the majority of the stakers. But with just over a third of the stakers/staking power running on Firedancer, no single client will have a supermajority on the network. And the benefit of having a second validator eliminates the issue of having a single point of failure.

According to the Firedancer website, the team aims to make significant progress on the development of the new client over the next 12-24 months. Whats more, the development will be open source, allowing anyone to see what is taking place.

Firedancers core code will be written in the C/C++ programming languages. These languages were chosen due to their widespread use in writing code that needs low-level access to a computers hardware. Low-level access means faster operating times, hence higher throughput and transaction speed.

How does it help?

Firedancer will:

Improve network efficiency.

Help scale the network.

Make it cheaper to run a validator node.

Make the network more decentralised.

Efficiency will be improved due to Firedancer using zero-copy networking to bypass most of the operating systems kernel network stack, coming with its own queues and other concurrency primitives.

Scalability will be down to the core developers and their understanding of the networks capabilities and limitations. Mechanical sympathy is when you use a tool or system with an understanding of how it operates best. This is where the teams behind Jump Crypto and Solana Labs aim to excel (both have significant backgrounds in low-level programming and engineering).

Running a node will be cheaper with a secondary client due to less hardware being needed per node. Less hardware naturally translates to a lower cost. However, it is worth mentioning that existing node operators will eventually have to make changes to their validators, as Firedancer will become an entirely separate node implementation at some point.

Lastly, higher decentralisation is managed by making validation more accessible. Firedancer will achieve this by lowering implementation risks that would impact large portions of the stake at once, and at the same time, by having a second self-dependent team of core engineers.

To learn more, visitfiredancer.io

Join our

Telegram / Discord / Twitter

Read more here:
What is Solana Firedancer and why is it important? - Geeks World Wide

Preventing attacks on mobile applications in the enterprise – TechTarget

The use of mobile devices within enterprise organizations is commonplace, so organizations must prepare for all sorts of mobile threat vectors -- including attacks via mobile applications -- to avoid a cybersecurity breach.

As the COVID-19 pandemic and the trend of working from anywhere have pushed many people to work remotely, mobile devices have become a primary channel for employees to stay in touch with their employers and enterprise networks. While this shift has offered convenience and flexibility to workers, reliance on mobile devices brings new security risks to the table. Ransomware, malware and other types of attacks can target mobile devices to great effect, and organizations must account for this to keep data secure throughout the enterprise.

It only takes one compromised mobile device for an attacker to access an organization's network. Corporate-owned and BYOD mobile devices are the ultimate target for land-and-expand attacks, where an attack on a mobile device sets the stage for another attack on a back-end system or cloud application. A typical corporate user's mobile device may have business email, a unified communications application such as Slack or Teams, and a Salesforce or other customer relationship management (CRM) client. When attackers compromise such a device, they have full access to the corporate network resources -- as if they're authorized users of the device.

Because many workers resorted to using personal and corporate-owned mobile devices to get their jobs done amid the pandemic, the mobile attack surface has grown in recent years. A 2022 report from mobile security vendor Zimperium found that a global average of 23% of mobile devices encountered malicious applications in 2021. The firm also found that 75% of phishing sites specifically targeted mobile devices that year.

Additionally, with each new application a user installs on a mobile device, the attack surface grows. Threats to applications, such as exposed APIs and misconfigured code, leave customer data open to attack. Outdated mobile apps only add to these security vulnerabilities. Organizations can look to enterprise mobility management (EMM) and other endpoint management tools for better control over applications. These tools enable IT to create and manage policies, such as automating mobile OS and app updates, for better mobile security.

Attackers may also target mobile devices for reconnaissance. Bad actors can use a mobile device's microphone and camera to spy on organizations and learn corporate secrets, such as research and development plans and financials. Compromised mobile devices can eavesdrop on sales calls or meetings about an organization's next big product.

There are many ways that hackers can compromise mobile devices through mobile apps. Prevent and mitigate the damaging consequences of attacks on mobile applications by keeping the following threat vectors in mind.

Malware is malicious software that can steal login credentials while bypassing two-factor authentication (2FA). Viruses, worms and spyware are examples of malware targeting mobile devices.

The fight against mobile malware starts with mobile antivirus software. IT must tightly control remote access to the enterprise network via mobile devices.

Malware attacks evolve with the support of state-sponsored and criminal hacking organizations. Some of these hacking groups have the technology and staff resources of a large software development shop. For example, a new and alarming trend in malware attacks against mobile banking apps is the dropper apps, which cybercriminals added to legitimate apps in the Google Play store. As hybrid work and BYOD policies blur the lines between personal and corporate devices, this is a significant threat to many organizations.

As DevOps and DevSecOps practices gain popularity, mobile app developers will increasingly have to move to mobile DevSecOps to build secure mobile apps. Many defense techniques will only grow in importance, such as code obfuscation to render app code or logic hard to understand and application shielding to guard against dynamic attacks, malicious debugging and tampering.

While IT teams can use obfuscation to protect data, hackers can also use this tactic to carry out ransomware attacks. A ransomware attack encrypts a compromised mobile device, locking the device user out. Ransomware attackers usually follow the same playbook with mobile devices as they do with PCs: Pay up if you want to regain access to your device and its data.

Ransomware was a part of nearly 25% of all data breaches in 2021 -- an almost 13% increase from the previous year -- according to findings from Verizon's "2022 Data Breach Investigations Report", and mobile devices are far from immune to such attacks.

Preventing ransomware starts with blocking corporate devices from downloading apps from any source other than their enterprise app store, the Apple App Store or Google Play. Some other critical steps to prevent mobile ransomware include the following:

Leaky mobile apps set the stage for a mobile device breach. As the name suggests, a leaky app is an app that corporate data seeps out of, like water leaking out of a cracked pipe. Poor programming practices create flawed code, which can enable the public and attackers to see application data such as corporate information and passwords.

It only takes one compromised mobile device for an attacker to access an organization's network.

Security flaws were a significant issue with the release of the Beijing 2022 Olympics app. The app was mandatory for all attendees and had flaws that could allow attackers to steal personal information and even spy on some communications. Common advice to the athletes and other attendees was to use a burner phone at the Olympics because of the mobile security threats that were present.

A similar threat emerged in January 2021, when Slack identified a bug in its Android app that logged cleartext user credentials on devices. While Slack did warn its users to change their passwords and purge the application data logs, potential access was wide open to attackers seeking corporate information. Although the bug did not lead to any headline-grabbing breaches, it shows that popular enterprise mobile apps are a potential attack vector.

To protect against flawed code and leaky mobile apps, organizations must train their mobile developers in secure coding practices and implement mobile application security testing as part of a DevOps methodology.

A software supply chain works similarly to an assembly line in a factory. It's a production cycle that pulls together partners, contractors and third-party vendors to produce software. Open source software components also travel the same supply chain.

Through the software supply chain, however, a cybersecurity vulnerability in one organization can lead to further damage for various other organizations. The SolarWinds software supply chain breach infamously showed this danger, with hackers gaining access to the networks, systems and data of thousands of the company's government and enterprise customers.

An attacker who compromises the software supply chain of a mobile app vendor can insert code in the app, which prompts an end user to download an update from a malicious site. A software supply chain compromise happens before an app hits a public or corporate app store.

Business application and service providers will no doubt ramp up their supply chain security to prevent these attacks.

Jailbroken iOS devices and rooted Android devices compromise the security posture of the entire device because they allow hackers to carry out privilege escalation attacks. When attackers gain access to a mobile OS, they can attack mobile applications indiscriminately.

EMM tools such as Jamf Private Access enable IT to set security policies that prevent jailbroken or rooted mobile devices from accessing enterprise resources.

As corporate applications migrate to the cloud, the prospect of man-in-the-middle (MitM) attacks -- where an attacker can intercept, delete or alter data sent between two devices -- becomes a reality. While there are other causes of MitM attacks, mobile applications using unencrypted HTTP can traffic sensitive information, which attackers can utilize for their nefarious purposes.

To prevent MitM attacks, organizations should start by training their development teams in secure coding standards and architecture. The same standards must also apply to vendors in their software supply chain.

To ensure the safety of mobile users and sensitive corporate resources, IT must know how attacks on mobile applications can take place and proactively defend against them. As an organization's use of BYOD and corporate devices evolves, so must its mobile security strategies. The key to creating such effective security policies is making the most of working relationships to share best practices among desktop and mobile teams, as well as the end users the organization supports.

Read the rest here:
Preventing attacks on mobile applications in the enterprise - TechTarget

Political Notes: The Biden rally and counter-programming, Moore’s new fans, Raskin’s ambition, and more – Josh Kurtz

President Joe Biden walks along the Colonnade of the White House on May 4, 2022, to the Oval Office. Official White House photo by Adam Schultz.

Maryland Democrats are gearing up for their big rally Thursday evening with President Joe Biden at Richard Montgomery High School in Rockville.

Their opponents are gearing up as well.

The president is the headliner, but other scheduled speakers at what promises to be a lengthy rally include Democratic National Committee Chair Jaime Harrison; Democratic gubernatorial nomineeWes Moore and his running mate, former state Del.Aruna Miller; Del. Brooke Lierman (D-Baltimore City), the partys nominee for state comptroller; U.S.Ben Cardin; U.S. HouseMajority Leader Steny Hoyer; U.S. Rep. JamieRaskin; andMaryland Democratic Party Chair Yvette Lewis.

But Republicans and conservatives also plan to have a presence, virtually and in person, for counter-programming.

Del. Dan Cox (R-Frederick), the GOP nominee for governor, plans to hold a news conference Thursday afternoon outside the Montgomery County Circuit Court, just a few blocks from the rally site. Earlier in the afternoon, the Republican National Committee is hosting a press call with Del. Neil Parrott (R-Washington), who is in a rematch with U.S. Rep. David Trone (D-Md.).

And the conservative group Help Save Maryland has put out an electronic flier inviting people to a counter-protest outside the high school, urging them to Rally Against Open Borders Joe Biden and His Sanctuary Cronies.

Rockville should be a fun place Thursday afternoon and evening but the traffic could be murder.

Wes week

Not surprisingly, the Moore campaign has kept the pedal to the metal on the fundraising front this week. We know of at least two major fundraisers that he held this week in Maryland.

On Tuesday evening, the Moore campaign had an event at the Woodmore Country Club near Mitchellville with several local and regional business leaders. The list included Everett Browning, a government contractor; John Clyburn, a business consultant and brother of South Carolina Rep. Jim Clyburn, the third-ranking Democrat in the House of Representatives; Gwen McCall, a business and leadership consultant; Emerick Peace, who runs a real estate firm; Terry Spiegner, who runs an IT company; and Freddie Winston, a construction company owner.

Del. Darryl Barnes (D-Prince Georges), the chair of the Legislative Black Caucus in Annapolis who supported Comptroller Peter Franchot, not Moore, in the Democratic gubernatorial primary was also listed as a sponsor of the event.

On Thursday evening, Moore traveled to Annapolis for a fundraiser at the Red Red Wine Bar sponsored by uber-lobbyist Gerard Evans and his multiple clients.

Other individuals and organizations that endorsed Moores Democratic primary foes are quickly falling in line. This week, the Maryland chapter of the Sierra Club, which had endorsed former U.S. Education Secretary John King in the Democratic primary, announced its support for Moore.

Wes Moore and Aruna Miller are a dynamic duo with diverse experience and lots of enthusiasm for bringing people together to solve problems. It doesnt get bigger than an existential climate crisis and threats on democracy from extremists, said Rosa Hance, chair of the Sierra Club Maryland Chapter. We are excited to endorse Wes Moore and work with him and Aruna to meet the challenges head-on.

On Friday, four locals of the Service Employees International Union, which had backed former U.S. Labor Secretary Tom Perez for governor, will endorse Moore in Baltimore. The unions represent health care, education workers, janitors, security guards and workers at BWI Marshall Airport.

Raskin eyes top committee slot

Tuesdays New York primary results were barely 12 hours and already ambitious House Democrats were jockeying to become the top Democrat on the House Committee on Oversight and Reform following the primary defeat of veteran Rep. Carolyn Maloney (D-N.Y.), who has held the committee gavel since the death of the late Maryland Congressman Elijah Cummings (D).

One of those jockeying: Maryland Rep. Jamie Raskin (D).

Raskin, according to Punchbowl News, Politico and other Capitol Hill-focused publications, is one of four Democrats eyeing the vacancy. But he has less seniority in Congress and on the committee than two of the other aspirants, Rep. Steven Lynch (D-Massachusetts) and Rep. Gerry Connolly (D-Virginia). Rep. Ro Khanna (D-California) is also seen as a possibility, but according to Politico, he is urging Raskins selection.

Raskin told Politico that he is actively exploring it and will have something to say this week.

The oversight panel is the venue for great political battles and when its run by the party opposite the White House it is often the center for partisan-tinged investigations. Even though the political environment has changed some over the past few months, the Republicans are still favored to seize control of the House in January, meaning Raskin and his colleagues are likely competing to become ranking member of the committee rather than committee chair.

Depending on how the congressional game of musical chairs turns out following the election, Raskin could also be in line to be the top Democrat on the House Committee on Administration.

Event-hopping in Howard Co.

Two Republicans running in the 9th legislative district, which Democrats have targeted for takeover, are holding back-to-back fundraisers on Sunday evening.

First, Del. Reid Novotny (R-Howard), who is hoping to oust Sen. Katie Fry Hester (D) in November, has an event scheduled at Circle D Farm in Woodbine, from 4-6 p.m. Then, from 6-8 p.m., Del. Trent Kittleman (R-Howard), who is seeking a third term representing the subdistrict District 9A, at a farm in West Friendship, a seven-mile drive away.

Kittleman and the other Republican in the two-seat district, Jianning Jenny Zeng, are running against Democrats Chao Wu and Natalie Ziegler. During the latest round of redistricting, Democrats made the district more favorable to their candidates by substituting a portion of Carroll County for a portion of Montgomery County.

Read more from the original source:
Political Notes: The Biden rally and counter-programming, Moore's new fans, Raskin's ambition, and more - Josh Kurtz

Grimes and Chelsea Manning break up – Page Six

That was fast!

Singer Grimes and whistle-blower Chelsea Manning, who just started dating in March, have broken up, a source tells Page Six.

Another source tells us the pair had been breaking up for a while.

Page Six first exclusively revealed the duo were an item in March. The pair linked up after Grimes, 34, had split from the father of her two children, Elon Musk, for the second time.

A source told us at the time that Grimes and Manning were getting serious. They U-Hauled it. Theyve been living together in Austin.

We were told that Manning, 34, had also kept her apartment in Brooklyn.

The same month it had been revealed in a Vanity Fair story that Grimes, real name Claire Boucher, hadwelcomed a second childvia surrogate with Musk. She told the reporter she would probably refer to him as my boyfriend, but were very fluid. We live in separate houses. Were best friends.

By the time the piece had printed though, theyd split.

Me and E have broken up *again* since the writing of this article haha, but hes my best friend and the love of my life, and my life and art are forever dedicated to The Mission now, Grimestweeted.

We hear the Oblivion, singer is currently back on the dating scene.

Former intelligence analyst Manning spent seven years in military prison after leaking classified documents to Wikileaks. She was sentenced to 35 years, but her sentence was commuted by Barack Obama.

Manning was released from prison in 2020. She has a memoir coming out in October called, README.txt.

Reps for both Grimes and Manning did not respond to request for comment.

In June, when asked about her romantic life, Manning told the Daily Beast, I prefer to keep my private life private.

Read more:
Grimes and Chelsea Manning break up - Page Six

Andrew Tate joins Rumble after Big Tech deplatforming, will post …

Kickboxer and self-help coach Andrew Tate has joined free speech video sharing platform Rumble after he was recently mass deplatformed by all of the major Big Tech platforms.

Facebook, Instagram, YouTube, and TikTok are some of the many platforms that banned Tate earlier this month after an online cancel campaign.

Tate responded to the mass deplatforming by joining Rumble. His channel already has over 65,000 subscribers and his most popular video on the platform has racked up over 240,000 views.

Videos from his TateSpeech YouTube channel dating back to July 2020 are also archived on Rumble.

And Rumble revealed that Tate plans to live stream exclusive content to Rumble.

Rumble will hold the line for free speech, whether we agree or disagree with whats said, Rumble tweeted. If you need earmuffs, there are other platforms for that.

During a recent appearance on Tucker Carlson Today, Tate discussed Big Tech deplatforming him and praised Rumble for allowing him to post his content without censorship.

You lose your Facebook, then your Instagram, then your Gmail, then your Discord, then your website hosting, then your domain name, then your payment processor, then your bank, Tate said.

Tate continued by stating that Big Tech banned him over a joke and told Tucker that hed moved to Rumble because senior management promised hed be allowed to make jokes.

One of the reasons Ive moved to Rumble[is] because Ive had long conversations with senior management there and theyve promised that I can make jokes without being destroyed and annihilated which is quite refreshing, Tate said. So I very much look forward to continuing mylegacy and continuing my work on Rumble rumble.com/tatespeech. And I know for a fact that my young fans will come with me. And this is just the beginning of amass exodus away from the influence of control by tech companies.

Tate is one of many creators to embrace Rumble after facing Big Tech censorship. Others who have moved to the platform include lofi hip hop creator Lofi Girl, conservative commentator and comedian Steven Crowder, and former Congressman Dr. Ron Paul.

As creators move to Rumble, it has reported record growth and continued to introduce new features. Rumble reported 76% year-on-year growth in monthly active users for Q2 2022. And it recently launched its ad platform, Rumble Ads, in beta and introduced free live streaming for creators.

See the original post:

Andrew Tate joins Rumble after Big Tech deplatforming, will post ...

Pro-Masculine Influencer Andrew Tate Joins Rumble After Big Tech …

After being removed by Facebook, Instagram, YouTube and TikTok in a matter of days, pro-masculine influencer Andrew Tate has joined the alt-tech platform Rumble.

Rumble extended the invitation to Tate last week when the coordinated deplatforming campaign against Tate began:

In his debut video on Rumble, Tate posted his final message, which tells his life story to individuals who are just learning about this popular influencer:

Big League Politics has reported on Tate becoming public enemy #1 from the regime as his controversial, anti-PC messages gain traction:

Popular pro-masculine influencer Andrew Tate has been banned from Facebook and Instagram as the tech giants stop his cult of personality from growing further.

Meta, the parent company for Facebook and Instagram, said that Tate violated their rules on dangerous organizations and individuals, resulting in his banishment.

Tate has become the latest individual targeted for destruction by the woke mob for spreading a message empowering young men to resist the gynocracy.

Im a realist and when youre a realist youre sexist. Theres no way you can be rooted in reality and not be sexist, Tate said in a popular video that has gone viral on social media.

The masculine perspective is you have to understand that life is war. Its a war for the female you want. Its a war for the car you want. Its a war for the money you want. Its a war for the status. Masculine life is war. If youre a man who doesnt view life as war, youre going to lose. Societys expectations of men is much higher than the societal expectations of females, Tate said in another one of his controversial quotes.

Joe Mulhall of the far-left group Hope Not Hate said that Tate poses a genuine threat to young men, radicalizing them towards extremism misogyny, racism and homophobia.

Read more:

Pro-Masculine Influencer Andrew Tate Joins Rumble After Big Tech ...

NBC Journalist Who Attacked Libs Of TikTok Once Took Credit For …

An NBC journalist who criticized the Twitter account Libs of TikTok for reporting on transgender surgery for minors at Boston Childrens Hospital (BCH) also authored an article in 2019 where she appears to take credit for Facebook removing the accounts of privately-run pedophile sting groups.

The efforts of Brandy Zadrozny, one of NBCs disinformation reporters, in both cases follow a nearly identical pattern. First, identify a perceived right wing element online that is highlighting or covering a contentious, questionable or perhaps even criminal issue. Then, cast the subjects of the coverage as victims of harassment. Source the public outrage, or harassment campaign, to the coverage itself, rather than the contentious, questionable or criminal behavior of the subject. Contact massive tech corporations and alert them that these groups are operating on their platforms.

Zadroznyreported that Libs of TikTok, who tweeted out videos the Boston Childrens Hospital produced and posted publicly promoting puberty blockers for children, were directing waves of harassment to the hospitals larger accounts. The hospital offers surgeries to artificially construct a penis out of a girls vagina, breast removal, and facial harmonization to eligible patients which include adolescents and young adults, according to the hospitals website. A review of publicly available documents by the Daily Caller News Foundation found that doctors at the medical facility performed at least 65 mastectomies on biological females under between the ages of 15 and 18. Since the blow back, Boston Childrens Hospital has amended its policyfor vaginoplasties from 17 to 18 years old.

Boston Childrens Hospital did not respond to a request for comment.

The result of Zadroznys reporting speaks for itself: Libs of TikToks reporting came Monday, Zadroznys on NBC News Tuesday, and Facebook locked Libs of TikToks page Wednesday. The usual suspects took a victory lap over the news. Zadroznys colleague at NBCs disinfo desk, Ben Collins, said Facebook nuked the account, characterizing the negative coverage as a campaign against BCH. Alejandra Caraballo, a transgender lawyer who specializes latelyin online censorshipand works at Harvards aptly named Cyber Law Center, explicitly encouraged Twitter to do the same. And an influential trans activist Erin Reid, digital director at Democrat fundraiser Act Blue, blared, TWITTER MUST FOLLOW, or it will be complicit in what is to come.

Michael Morris, Managing Editor of Free Speech America and Business at The Media Research Center, says its becoming more common for the far left to call speech they disagree with violent in an effort to silence opposition.

If you disagree with the leftist narrative, the left and the big media left is going to come out and try to silence your opinion, or at the very least to try to change the narrative to match what they want, Morris told the Daily Caller.

The harassment campaign against Twitter has so far not worked, and Facebook has since restored Libs of TikToks account.

The case of POPSquad in 2019 fits an identical playbook.

In January of that year, Zadrozny reported that anti-pedophile sting groups were making alleged pedophiles the victims of shaming and cyberbullying. Zadroznys article profiles 20-year-old Alain Malcolm, an alleged pedophile, who was going to a rendezvous with a 14-year-old boy he had met online for sex. After the anti-pedophile group Prey on Predators (POPSquad) confronted him, promising to expose his behavior to the public, Malcolm went home and committed suicide. (RELATED:Terrorism: Trans Activists Push For Censorship Of Discussions On Child Sex Changes)

Zadrozny complained in the article that anti-pedophile sting groups receive hundreds of thousands of likes and follows on Facebook.

Facebook is a key piece of the groups strategy, Zadrozny wrote.

After an inquiry from NBC News, Facebook temporarily suspended several predator hunter accounts, removed some individual posts and deleted at least one group entirely, Zadrozny wrote in the article. Some groups voluntarily removed their own pages to escape what they saw as a purge. POPSquad appeared to be unaffected.

While not explicitly calling for a ban in public, Zadroznys reporting in this case follows the overall pattern of NBCs disinfo desk: Frame Facebook as essential to the groups potency, then claim the group is causing real world harm, and repeat the claim several times until the platform capitulates.

Facebook did not respond to the Callers request for comment.

Zadroznys private emails might be more explicit, but NBC was unwilling to be transparent about how she communicated with them. An executive at NBC did not respond to repeated requests from the Caller to make Zadroznys 2019 email correspondence with Facebook public.

In since-deleted tweets the Caller accessed through WayBack Machine, Zadrozny posted the story at the time of publication, highlighting portions that referenced Facebooks role in platforming anti-pedophile sting groups.

Collins tweeted the story when it dropped in 2019, highlighting a portion of the article where Zadrozny quotes a Wesleyan University professor who indicted the platform, saying, These kinds of stories, visceral and violent, are more likely to be shared on Facebook.

Zadrozny retweeted Collins thread.

Despite their enthusiastic promotion of the story, the public reaction to Zadroznys reporting was far less warm. Users criticized her reporting for seemingly excusing the crimes of pedophiles, calling her out for appearing to encourage social media platforms to censor the story.

In fact, it seems some of the only positive reactions to Zadroznys story came from other blue check journalists, one of whom called Zadrozny a national treasure.

In neither case, Libs of TikTok nor POPSquad, did Zadrozny include an independent voice willing to defend their efforts.

Joseph A. Travers, a private investigator and Chairman Emeritus of Saved In America, a group of former Navy SEALS and police officers that locates victims of human trafficking and violent pedophiles, told the Caller that groups like POPSquad are good, as long as theyre working with or in coordination with law enforcement.

Because it doesnt do any good to do that and then the person leaves and theres no punishment. And it enhances in their [the pedophiles] own mind, oh I can get away with this,' Travers said.

In his work at Saved In America, Travers also noticed suspicious activity from Facebook in regard to the organizations follower counts.

When we first started and as were accelerating, the followers on Facebook started reaching thousands, right? But then all of a sudden it stopped, and we know its not because theres not more followers, Travers said.

Travers told the Caller that pedophiles who are shamed or bullied online as a result of their predatory behavior are anything but innocent victims.

If you try to go and procure and rape somebodys son or daughter, well, youve caused your own bullying and your own shame, he said.

Anti-pedophile sting groups have uncovered alleged criminal activity from high profile individuals in the past. A manager at Meta, Facebooks parent company, was caught discussing alleged sexually explicit texts with a person who said he was a 13-year-old boy, after a sting operation from Predator Catchers Indianapolis. A senior Vice President at Sony is under investigation after allegedly trying to meet a 15-year-old boy for sex, according to a YouTube video posted by the anti-pedophile sting group People v. Preds, CNET reported.

Activist James Lindsay, who was suspended from Twitter in August after an apparent Media Matters harassment campaign and repeated reporting of his account from Caraballo, told the Caller, The playbook needs to be exposed so it stops working.

This is a dishonest and frankly dangerous tactic that has been trotted out again and again, and its high time we start recognizing it and condemning it, Lindsay said. Its certain Twitter doesnt have the needed principles to do that, of course, and I hope their shareholders try to get them back on track before it costs them.

Activists on the left, however, claim that accounts such as Libs of TikTok present a direct threat of harm to LGBT individuals.

Accounts like Libs of Tiktok have engaged in severe demonisation [sic] of LGBTQ people, Caraballo tweeted Wednesday. Carabello then echoed Zadroznys reporting, transferring the source of the outrage from the policies of the hospital to the people who reported on them.

These accounts are demonizing and dehumunizing [sic] their targets while simultaneously using violent imagery and rhetoric. They deny all of the resulting violence or effects of their actions, Caraballo continued.

The day after her Libs of TikTok story, Zadrozny wondered on Twitter if social media companies would protect those who are targeted by the rights reporting techniques.

Will it change how social media companies protect users or people who are targeted through their platforms? I dont think so, Zadrozny wrote.

Go here to read the rest:

NBC Journalist Who Attacked Libs Of TikTok Once Took Credit For ...

Web3 Will Make Or Break Social Media – Forbes

WEB3 next generation world wide web blockchain technology with decentralized information, ... [+] distributed social network. Web3.0

Web3 has been hailed as the savior of the internet, a new paradigm, the future of networking, and, a digital revolution. To its proponents, this open internet standard promises to right all the wrongs that are synonymous with Web2, from lack of ownership to censorship and opaque data sharing.

Should this vision materialize, Web3 will host a vastly different internet to the one we have become accustomed to, but there are some who doubt the tech will take off. Ownership of user-created content, greater privacy, and an end to rampant de-platforming might be easy concepts to sell, but achieving this grand vision is likely to take longer than Web3 architects hope.

Web3 is built on many of the same cryptographic tools that are synonymous with cryptocurrency including blockchain, tokenization, and distributed storage. Dont trust, verify is the catchphrase of bitcoiners who would rather rely on mathematics to safeguard their wealth than the whims of central bankers and governments. And yet, paradoxically, convincing web users that they can trust such trustless technology is proving to be a greater undertaking than web3 developers might have imagined.

As Dr. Gavin Wood, the founder of Web3 Foundation and Polkadot blockchain network acknowledges, We may have to go through one or two hype cycles before the most important elements of the technology break through.

While the tech is ready, the world may not be ready. It took the better part of a decade for Bitcoin to permeate public consciousness and achieve mainstream recognition. Could the same be true of Web3, and if so, what does this mean for the industries that stand to benefit the most from the technology?

It would be easy to assume that Web3s primary beneficiaries will be tech companies that are crypto-adjacent, like those utilizing blockchain, tokens, or AI, in some capacity. In reality, the internet standards fostered by Web3 have captivated companies across a range of sectors with big brands taking the lead.

Nike NKE , synonymous with sportswear, has been wooed by the promise of the metaverse, the virtual world in which, if the hype is to be believed, we will all soon be socializing and even working. More than seven million visitors have checked into Nikeland, the Roblox-based virtual world thats been graced by sports stars such as LeBron James. Nike also accompanied such fashion titans as D&G in crafting NFTs that will enable metaverse users to clad their avatars in the hippest attire.

Elsewhere, Facebook has re-branded as Meta as part of its metaverse push, while games studios have been latching onto Web3 for other reasons, such as the ability to boost in-game spending through the creation of secondary markets for trading rare items such as skins, loot boxes, and weaponry. When represented as NFTs, these items can be freely traded between players, and have given rise to Play-to-Earn, a gaming vertical that remunerates players for the time they expend on leveling up their character to boost its value.

And then theres the social media platforms, which face a dilemma when it comes to Web3 - do they embrace or eschew it? While many of Web3s core principles appeal to end users, what do Web2 platforms stand to gain from a system that threatens to reduce their power to monetize and control the way users interact?

Social media giants have made their money off the hub-and-spoke model that underpins Web2. Their monopolistic platforms call all the shots, dictating who can play, the rules of the game, and ownership of the content their users create and curate. As de-platforming and censorship have ramped up, the debate over free speech has intensified, bolstering the case for open internet standards that can break down the walled gardens of Facebook and Twitter.

Free speech is not strictly a tech issue but given that centralized platforms have increasingly amplified what can be said and by whom, its natural that Web3 architects have developed new solutions to this thorny problem. Elon Musks proposed Twitter takeover appears to have floundered, extinguishing the flickering hope that draconian user restrictions could be rolled back and polarizing figures such as Donald Trump reinstated.

Web3 offers more than merely the means to circumvent censorship however. Its also suited to new business models such as micropayments. These provide an alternative monetization strategy for users tired of being bombarded with adverts and invasive cookies that monitor their every click.

Jeff Baek, CEO of Web3 payments firm PIP, believes micropayments allow anyone from around the world to participate in the global economy asserts, Today, everyone, regardless where they reside, is connected on social platforms like Twitter already, they just need to be connected monetarily. Current payment systems are siloed, Twitch has its own wall-gardened payment system, YouTube has its ownWeb3 allows free flow of money just like the internet did with information.

Cryptocurrency has the potential to facilitate global payments, including micropayments, and to empower social media users who can be rewarded for the content they create. One of the ways to achieve this is through the use of social tokens that are awarded to end users such as creators and even entire communities.

According to Sakina Arsiwala, the co-founder of the Web3 social network Taki, The majority of monetization activity is based on one-way transactions, subscriptions or donations with Web2, but as with social tokens, were able to create dynamic economies where participants can buy/sell, hold, stake, as well as redeem tokens for specific utility tied to the product experience.

"When designed correctly, social tokens put the majority if not all the economics in the hands of end users and therefore provide a better monetization alternative than on Web2.

The alternative Arsiwala speaks of has already been utilized by Brave, whose BAT token rewards ad consumption on its web browser, and is on Taki. But as Arsiwala is keen to stress, the use cases for tokenization arent limited to ads, noting interesting areas for feature development include leveraging micro-payments to combat spam DMs and sorting feed or comment threads based on coin activity.

For all the talk of Web3 shaking up fashion, social networking and everything in between, it remains tantalizingly out of reach. The tools are there but the audience has yet to arrive. Achieving the network effects necessary to achieve critical mass have thus far proven evasive.

Steemit, the first blockchain-based blogging and social media platform, launched in 2016. Despite blazing a trail for todays Web3 imagineers to follow, Steemit is today a footnote in internet history.

Progress might be slow, but Web3 proponents remain undaunted. As the crypto and stablecoin market grows, there will eventually be enough incentives for non-crypto users to enter the Web3 ecosystem, predicts PIPs Baek, It will happen slowly, but it will certainly happen.

More here:

Web3 Will Make Or Break Social Media - Forbes