# Reading Responses (Set 1) - Checklist for a [good reading response](https://reagle.org/joseph/zwiki/Teaching/Best_Practices/Learning/Writing_Responses.html) of 250-350 words - [ ] Begin with a punchy start. - [ ] Mention specific ideas, details, and examples from the text and earlier classes. - [ ] Offer something novel that you can offer towards class participation. - [ ] Check for writing for clarity, concision, cohesion, and coherence. - [ ] Send to professor with “hackmd” in the subject, with URL of this page and markdown of today’s response. ## Reading responses 5 out of 5 ### Sep 20 Tue - How the Web works How in the world does HTTPS actually work? Hartley Brody outlines in his article how the system actually protects user data, why it's an excellent function, and it specifically guards against. In "How HTTPS Secures Connections: What Every Web Dev Should Know," it's shown how a request passed through networks can be a vulnerable point for malicious users to eavesdrop or tamper with the connection. In necessary cases regarding very sensitive information such as credit card numbers and passwords, two cryptography paradigms can be incorporated to secure communications. Public key cryptography applies to shared authentication-- it's useful for two parties who aren't familiar with one another to have a secure connection by using a shared secret key. This is made possible by a Diffie-Hellman key exchange, which involves math for the shared secret to stay hidden. Symmetric key encyrption is more efficient. It uses cipher suite through processes of authentication and certificates to let clients and servers communicate back and forth. In this scenario, a public key infrastructure are in charge of signed certificates to ensure someone is who they say they are. Ultimately, a digital signature binds a public key with a user's identity. There's a lot regarding the technicalities behind web design and online security that I'm unfamiliar with, so it was actually extremely interesting to read about the systems that make up these functions we use on a regular basis. Every time we purchase items off the internet or exchange messages with another individual through a server, these are all sets of data that travel through "a series of tubes," essentially. And the way requests are processed and kept private is undoubtedly much more important than we give credit for. I still have many questions about how exactly these can stay relevant, efficient, and fool-proof in an age of rapid technological growth. Without understanding exactly how these systems function, it seems like symmetric key cryptography is a much more effective, efficient, and safe option in comparison to public key. Relating to how we discuss in class the increasing reliance on our phones and technology in general, how might all these precautions and developments possibly lead to AI and all the concerns that come with that? ### Oct 4 Tue - Cooperation It's no secret-- people gossip. We love to talk about people to other people. This circulation of information contributes to the social networks in which individuals create invisible groups and divides. In Joseph Reagle's piece "[The Bottom Half of the Web](https://readingthecomments.mitpress.mit.edu/pub/dtys4tyk/release/2#gossip)," he identifies the practice of gossiping as an "evaluative social chat." By forming alliances, social cognitions feed into the concept of cooperation, or lack thereof. This ties into the reading "Super cooperators," in which Nowak outrightly condemns gossip. It sets us up for misinterpretation, misunderstandings, and chaotic babbling of information that can easily be completely untrue. Nowak also describes this as a byproduct of cooperation's evolution, for the information we pass down through generations isn't exactly perfect. "Cooperation is the architext of living complexity." In its most basic nature, cooperating with one another solves dilemmas and essentially helps society work through problems and overcome crises. Nowak's report suggests how natural selection favors cooperation because of how beneficial it proves to be in terms of shaping cultures and communities. Although I've never thought of cooperation in such a technical sense so as to connect it to a scientific and biological concept, the reading poses a lot of valuable possibilities. The message is simple, for almost anything can be looked at, in the grand scheme of things, by how it's transformed and/or persisted throughout generations. To achieve mutual benefits, groups of organisms must sometimes sacrifice or invest resources to help others. This makes me think back to lessons on various mutual symbiotic relationships that occur naturally in our ecosystems. Animals regularly demosntrate cooperative behaviors for self-preservation and limit competition. For example, wolves often hunt in packs to kill animals larger in size that they might not win against individually. There's also cooperation between species, such as ants and aphids. As ants feed on the honeydew liquid created by aphids, the aphids receive protection from ants against predators and parasites ([Osterloff](https://www.nhm.ac.uk/discover/mutualism-examples-of-species-that-work-together.html)). ![](https://i.imgur.com/0zUvzI0.jpg) Exploring the concept of cooperation in a technical and evolutionary way helps put into perspective how we often really need to work with each other rather than against each other to reach success. Especially in a experiential college experience with valuable opportunities, this is a healthy notion to maintain. Before instinctively resorting to a competitive mindset, we often should assess the ways in which we could go farther together if we weren't trying to step climb over one another all the time. ### Oct 7 Fri - Social Networks How are social networks transforming society? A large part of globalization actually is influenced by these transits of information, especially by groups like activitists who are consistently reconstructing civil society on all levels. Connections made through social media often get underestimated on how effective they are on building relationships. These relationships in turn form vast networks, because people regularly conversate in forums and communities. Collecting insights from such a wide variety of sources can actually be studied with computer programs and maps through SNA. Facebook friends are often referred to as "social graphs" to tie people or nodes to each other and other groups. Concepts like these discussed in Rheingold's reading "Social has a shape" makes me think back to an earlier lesson we had on information filtering and fake news. With networks being such a powerful way to shape the future, it's also crucial that the type of news we're putting out on personal and public pages are as accurate as possible. As detailed in the article, it's beneficial to have bigger networks with diversity so as to ultimately possess greater capacity to solve problems. Circles that are too tightly knit and share too polarizing idealogies are less likely to end up in better social shape. These are also breeding grounds for fake news and false information to run rampant. Though networks are generally built on commonalities and shared attributes/beliefs/goals, those who belong to many social groups might end up having greater roles within networks & communities. Similarly, exposure to multiple facets of information typically result in a lesser likelihood of consuming false details and prevent circulation of misinformation. There's another point the reading touches on-- that "those who manage their time well, especially strategic multi-taskers" will thrive in environments with high networked individualism. This relates back to the attention topic we discussed in class. In those readings and conclusions, we touched on the possibility that the concept of "multi-tasking" isn't actually attainable and does not result in high productivity. Many students proposed that it's more likely continuous partial attention. Therefore, I wonder if the practice of multi-tasking mentioned by Rheingold is somewhat like this idea of not fully placing all of one's attention on any single task. And if it is, how would that cultivate more nimble and effective habits when it comes to community engagement? ### Oct 11 Tue - Haters Why are there so many haters? A big part of hating online stems from the fact that remarks and comments can be made invisibly. Anonymity protects people from having to take accountability for the language they use and the influence their words can have on others. Reagle references "trolls" online who are sort of like pranksters drawn to the opportunity of causing misunderstandings and rancor for fun. Online obscurity plays a huge role in these mean-spirited behaviors, for the amount of users creating bullying and/or harrassing posts have undeniably increased with the adoption of technological advances and will likely continue to rise. Part of this is due to the fact that platforms' automated systems are unable to effectively take down hateful content. Because everything is extremely situational, obscure, and often difficult to interpret for nonhuman judgement, the frequency of negative interactions online is hard to measure and prevent accurately. [NPR's article](https://www.npr.org/2021/11/09/1053924352/facebook-instagram-bullying-harassment-numbers) on Facebook touches on the topic of body image and Instagram's role in worsening the phenomenon. Now with TikTok, there seems to be a general consensus online that it's only gotten worse. It's also too easy to sink into an endless stream of short videos that promote unhealthy eating habits for teen girls. Because the "FYP" feature is specifically curated to each user's consumption habits, someone extremely sensitive to an issue like body image may consistently be shown discouraging content. I've heard from individuals that it often feels like they're always seeing thin women on their feed that are popular for the very reason that they are skinny and fit societal beauty standards. In the comment sections of these videos, the remarks also range from extreme praise to blatant body shaming. It's become so normalized for comment sections to be known as "hilarious" or "brutal" with the worst remarks made by anonymous accounts with no profile. ### Oct 14 Fri - Exam Review ##### **Multiple choice #1** With regard to how the internet works, which best distinguishes the difference between DNS and Internet Protocol (IP)? a) DNS matches the name to address mapping; IP is responsible for responsibly delivering data. b) DNS searches for the application being requested; IP is the cookies within your webpage. c) DNS holds a public key to exchange a secret; IP is the certificate to authenticate that key d) DNS matches the name to address mapping; IP is responsible for the "where" part (addressing and routing). ##### **Multiple choice #2** What scenario below best exemplifies the concept of Tragedy of the Commons? a) national defense and public safety b) using lighthouses c) traffic on the freeway d) going to movie theaters ##### **Short answer #1** As explained by boyd in "Agnotology and Epistemological Fragmentation," how can all three concepts of dis/mis/mal-information result in agnotology? ##### **Short answer #2** Explain the difference between a troll versus a hater when it comes to online activity. #### Answers & Explanations ##### **Multiple choice #1** *The correct answer to this question is d). This is because although option a) has the correct definition for DNS, the definition for IP is wrong. DNS has to do with the "who" part, and IP has to do with the "where" part.* ##### **Multiple choice #2** *The correct answer to this question is c). All other options are technically examples of public goods, with option d) being slightly debatable, for one could argue that a movie showing selling out tickets would result in crowded seating and no availability for others to view a film. However, showings are repeated and have many open times, which doesn't make it the best example of a tragedy of the commons. Driving on the freeway is a better example, for traffic is caused by too many individuals trying to use the same path to where they each want to go, thus resulting in halts and stops and an overall longer commute time.* ##### **Short answer #1** *Agnotology is used to describe the strategic and purposeful production of ignorance, and can be easily wielded by the powerful as a tool of oppression. In most of these cases, ignorance is sort of being manufactured and spread strategically. Disinformation and malinformation both have intent to harm, while disinformation only refers to strictly false detail. In both cases, individuals could be making up or spinning information for the sole purpose of tricking the innocent. Misinformation can easily play into this when it comes to the spread of said information. People who hear of stories or news might unknowingly repeat it to others, thus increasing the ignorance caused by this harmful information.* ##### **Short answer #2** *Trolls are provocateurs and mainly make remarks to provoke others and get a laugh out of an audience. There isn't always necessarily a hateful or mean-spirited intention behind their actions. On the other hand, haters demonstrate hostility and purposely attack others on the internet. These groups of people demonstrate intent to harm and/or belittle others.*