1 | Reflection on: TikTok's catfish problem is worse than you think via GIPHY "Our ideas about truth and authenticity are meaningless.." - Rebecca Jennings Catfishing used to be fun! Being able to become a completely different person and mess with people was something I used to do as a kid funnily enough. The thought behind doing it was just to entertain myself. I could act older and mess with people I would never see again. I would not go beyond myself and try to create a popular online persona, I would just get my laughs in and log off. This new era of catfishing is just disturbing. From legitimate CGI influencers to deepfakes to appropriation, people are taking it too far. Tiktok is a breeding ground for this kind of behavior. Everyone wants to be something they are not. You have the wannabe Kardashians. People who would like to capitalize off of black culture and adopt only certain aspects. You have people who love to fetishize Asians; to make it seem less weird by trying to adopt stereotypical Asian features. Then you have weirdos like Coconut kitty who purposely makes herself look like a young teen to capitalize off of pedos.
12/2/2022Carolyn [Caz] she/her/hers Who is Caz? hellooo, my name is carolyn but I also go by caz. I'm a fourth year psych major w/ a minor in communications. one thing to summarize me is that i get passionate about things quickly! quick facts about me - cat mom - peaked at bronze 2 on valorant ˊᯅˋ - fav artist : joji
11/21/2022Before uBlock Forbes before: Initial load in: Front page: Lower front page: Inside article:
11/15/20221 | Reflection on How HTTPS Secures Connections: What Every Web Dev Should Know Best STI* protection against the internet? Math. This is how Hartley Brody describes the process of security through key encryption on the internet. Or at least my way of understanding what he meant. STI in this context meaning System Technology Infection What Brodly taught us in our first TechEd class is there are different paths (networks) to our destination (requests) on the internet and different options of protection (HTTPS) that is used to get to them. On this path, any malicious user could stop and see this information on your path; Information you do not want them to see like your passwords or credit card information. To prevent this STI from even getting a chance, things like TLS, or more specifically, Public Key Encryption, are used. But Carolyn, I thought you said math was the best way?
10/20/2022or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up