Chao-Kuei Hung
    • Create new note
    • Create a note from template
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Write
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
    • Invite by email
      Invitee

      This note has no invitees

    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Note Insights
    • Engagement control
    • Transfer ownership
    • Delete this note
    • Save as template
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Versions and GitHub Sync Note Insights Sharing URL Create Help
Create Create new note Create a note from template
Menu
Options
Engagement control Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Write
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
  • Invite by email
    Invitee

    This note has no invitees

  • Publish Note

    Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

    Your note will be visible on your profile and discoverable by anyone.
    Your note is now live.
    This note is visible on your profile and discoverable online.
    Everyone on the web can find and read all notes of this public team.
    See published notes
    Unpublish note
    Please check the box to agree to the Community Guidelines.
    View profile
    Engagement control
    Commenting
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Suggest edit
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    Emoji Reply
    Enable
    Import from Dropbox Google Drive Gist Clipboard
       owned this note    owned this note      
    Published Linked with GitHub
    Subscribed
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    Subscribe
    # 資訊科技與社會 共筆筆記 ## 2/15 endless scrolling、 biometrics 生物辨識、 gait analysis 步態辨識 Voiceprint聲紋辨識 生物辨識 biometrics 步態辨識 gait analysis: 像每個人走路的步態都不一樣,用以辨識,比臉孔辨識更容易監控! 聲紋辨識 acoustic fingerprint : 透過聲音辨識 Android手機跟電腦連線的方式:adb 刷機: 重灌作業系統,可奪回手機自主權 (Android)Root=(iOS)越獄(jailbreak):進入不該進去的地方,且該地方具有重大控制權 f-droid : 類似 playstore 的市集,但上面所有app皆有原始碼 Android Adb(Android debug bridge) IOS 62078 越獄jailbreak root(Android 版越獄) 刷機 rom flashing:重灌作業系統 F-Droid(有原始碼的 android apps 市集) Blokada(阻擋廣告、惡意軟體) ublock origin JavaScript瀏覽器裡讓網頁可以互動(例如地圖)程式語言 ## 2/22 openstreetmap --> 地圖版的維基百科 osmand:離線地圖app 中共網絡安全法第28條:網路營運者應為公安機關......提供協助 社會信用體系: 提高全社會的誠信意識而對其公民推出的評價系統 後設資料(元資料):metadata 描述其他資料的資料 ## 3/1 eye-tracking 眼球追蹤 spy pixel:以1*1大小的圖片,作為網站監視的媒介 pixel像素 影子帳戶:就算沒有註冊依然,會有資料的在其資料庫 shadow account UI/UX(user interface/user experience) ## 3/8 planned obsolescence 計畫報廢 electronic frontier foundation電子前哨基金會 right to repair :維修權 e-waste:電子垃圾 externalization of production cost:生產成本外部化 modular 模組化:大機器可拆解成很多零件,壞一小部分只需要換一小部分 BIOS/UEFI:開機時最早取得控制權 BIOS舊版 UEFI新版 燒在硬體的軟體稱為韌體 Boot Menu(開機選單) boot loader:把作業系統帶起來的小程式。開機,硬碟上最早獲得控制權的程式,例如 grub、extlinux、lilo partitions:分割區 BIOS/UEFI開啟boot Menu 偵測開機來源(光碟,網路線...) Boot loader開啟boot menu 選擇作業系統(Windows,Linux...) DRBL (Diskless Remote Boot in Linux) K(kilo):約一千 (實際上是1024) M(mega):約百萬 (實際上是1048576) G(giga):約等於十億 (實際上是1073741824) GNU/Linux free software 自由軟體 又稱 open source software 創始人:Richard Stallman 自由軟體可以販售 ## 3/15 executable:可執行檔 (給電腦讀的) source code:原始碼 (給人讀的) kernel作業系統的核心 Linus Torvalds:linux kernel作者 GNU的作者:Richard Stallman distribution:發行版本,例:debian、ubuntu Nicholas Negroponte:OLPC 給每個小孩子一人一台電腦(關鍵字) P2P/mesh network:,每個點(電腦)皆可互相接通 tree/hierarchical:有骨幹網路,樹枝狀分散 ## 3/22 幾進制轉換:https://notfalse.net/14/numeral-system-intro root kit取得最高權限的工具 Fair Use right 合理使用權 白帽駭客 道德駭客或電腦保安專家,專門從事滲透測試及其他測試方法,確保資訊系統安全 黑帽駭客 一種非法使用電腦技術來破壞或竊取資訊的人 Win XP WGA(Windows Genuine Advantage):微軟用來檢查你的 Windows XP是不是正版的程式 win10 telemetry:將資料回傳回微軟,讀取客戶使用習慣;遠端計量 WPBT:長效後門 Windows platform binary table 微軟(WPBT)為硬體廠商開的後門,位於UEFI Intel management engine:在CPU中獨立與主CPU外小CPU,不受主CPU控制,可監控控制主CPU secure boot:安全開機 secure boot:只能透過硬體廠商認證的方式開機,亦為市場壟斷的一種手法 # ## 3/29 Mobile Device Management(MDM):行動裝置管理系統,取代裝置最高權限軟體(root kit) carrieriq:裝在原廠手機的惡意(root kit)軟體,有手機最高控制權,因為電信業者跟手機廠商合作 pixel map :線上簡易地圖產生器 raster graphics:點陣圖,使用像素陣列來表示的圖像 scalable vector graphic:可縮放向量圖形,一種基於可延伸標記式語言,用於描述二維向量圖形的圖形格式。 SVG:可縮放向量圖,放大不會失真(沒有raster)(vector) JPG:失真率高的壓縮檔,放大會模糊(仍為點陣圖)(lossy)(raster) PNG:一格一格的,[](https://)可攜式網路圖形 (raster) CSV:comma separated values 用逗點隔開的格式(只有文字),陽春版的x**~~~~**lsx Format Container: avi,mp4,ogg,flv,mkv Video codec 影像檔。例:H.264 audio codec 聲音檔。例:AAC Captioning Video description Metadata:描述其他資料的資料author,title,location, date,copyright, license…… encoding 壓縮(與decoding,合成codec) decoding 解壓縮 圖檔格式比較: ![](https://i.imgur.com/6cYngyV.png) 影片格式: ![](https://i.imgur.com/BXYcF74.png) ## 4/12 barrier of exit / switching cost:軟體用戶想要改用其他廠牌軟體時,所需付出的代價 walled garden(花園高牆):無法用其他家通訊軟體與他人溝通 ODF open document format odf=> odt, ods , odp ‌ooxml=> docx, xlsx , pptx xmpp 開放的通訊協定 communication protocal通訊協定,eg. smtp pop3,http https http瀏覽器與伺服器溝通手段 https有加密版 Federated services 聯邦式架構:伺服器不同卻有相同語言,例:email, madtodon network effect/ network externality/ demand-side economics of scale 網路外部性:消費者選用某項商品或服務,其所獲得的效用與「使用該商品或服務的其他使用者人數」具有相關性時,此商品或服務即被稱為network externality Metcalfe's law:通訊軟體的價值正比於使用人數平方 digital rights management 數位權力管理:避免內容被盜拷,將消費者視為潛在小偷,保護著作者權利 fair use right合理使用權 analog hole:類比漏洞是複製保護技術中一個本質上無法避免的漏洞 interpretability互通性 file format specifications檔案格式規格書(spec) import 匯入 export 匯出 匯入功能做得好 匯出做的差 --> 讓消費者難以離開服務 reverse engineering 逆向工程:破解DRM,沒有文件的情況下研究該軟體 Kerckhoffs'principle:只有開放讓資安專家檢視,才是好的加密演算法 security of obscurity:把程式碼寫的複雜,讓使用者無法做逆向工程,不安全 ## 4/26 cryptographic hash function(one-way function):密碼(單向)雜湊函數,檢查資料是否有更動過 hash value(message digest):雜湊值,單向雜湊函數輸出的東西(長度固定) one way function --> 逆向算回來很難算 輸入值差一點hash value就會差很多 pre-image resistance:倒推輸入值非常困難。 second pre-image resistance /collision resistance:很難找兩輸入值得出一樣的輸出值。 plain text:明文 encrypt:加密 ciphertext:密文 decryption:解密 非對稱式加解密 asymmetric encryption 收件人公鑰加密需收件人私鑰解密 使伺服器相信其他裝置,將裝置的「公鑰」傳送的伺服器上。 ![](https://hackmd.io/_uploads/HJy2ZTvVn.png) ![](https://hackmd.io/_uploads/r1bp-Tv42.png) symmetric encryption對稱式加解密:同一密鑰執行加密解密 RSA加密法(非對稱式)r=p*q,r為pq兩質數之積做公鑰,p或q則為私鑰。 random number generator 亂數產生器 數位簽章需用簽章者的私鑰加密 簽章者的公鑰解密 ## 5/3 Edward Snowden 美國 NSA 的稜鏡計畫 whistle blower:吹哨者 MitM attack中間人攻擊 Dual EC DRBG後門(一種特定規格的亂數產生器)如果收件人的金鑰是採用它而產生的,這種加密信件會被破解 DeFi 去中心化金融 mnemonics 助憶詞:計算機程式設計語言(尤指組合語言)中運算碼之簡字形式,便於程式人員記憶的代碼。例如MPY代表乘,DIV代表除等等。 address 位址 Merkle tree - [ ] Merkle root :對資料的任何輕微修改都會給得到一個完全不同的 Merkle Root。 > []nonce: 礦工要把數字填進去使所有雜湊函數符合一條數學算式 transaction:交易紀錄 ## 5/10 ledger 帳本 proof of work : 要求使用者進行一些耗時適當的複雜運算,並且答案能被服務方快速驗算,以此耗用的時間、裝置與能源做為擔保成本,以確保服務與資源是被真正的需求所使用。比特幣採用此技術 proof of stake : 誰的加密貨幣多(誰的錢多),就有能力去爭取新的區塊 smart contract : 是一種將雙方的協議條款,並用代碼形式在區塊鏈上運行,儲存在一個公共資料庫中,不能被更改。 coin vs token : Coin 是用於支付、儲存價值的數位貨幣,其主要的用途是作為流通的貨幣使用。Coin 擁有獨立的區塊鏈,它的交易被儲存在區塊鏈上,且是可以透過挖礦挖出來的。Token 是可以在給定項目的生態系統中使用的數字資產。與 Coin 不同的是,代幣需要在區塊鏈平台上才能運行。 non-fungible token (NFT) 非同質化代幣 : 利用區塊鏈技術的新認證方式(數位資料)。針對原本能任意複製的數位內容,此技術有其獨一無二的價值 比特幣發行人:中本聰(Satoshi nakamoto) 密碼貨幣交易是pseudonymous(化名)非anonymous(匿名) Collateral freedom 一種反審查,透過在程式的註解,寫入一些被管控的言論。如在github上,放一些中共會哭哭的檔案。 ## 5/17 DoS(denial of sevice):佔線,使服務失效 DDoS(distribute denial of sevice):分散式阻斷攻擊,DoS的多重版3 botnet 殭屍網路 :駭客用已控制的裝置為載體,進行DDoS browser fingerprinting(裝置指紋):以辨識目的而收集的裝置軟硬體資訊。 cross device tracking:跨裝置追蹤 虛擬私有網路vpn(Virtual Private Network):可保護通訊隱私而且可翻牆 ## 5/24 Shoshana Zuboff監控資本主義的作者 大數據5個V volume variety velocity value veracity neuron神經 weight在此指權重 back propagation根據答案是否正正確,調整計算方式 權重矩陣weight matrix:指在機器學習和人工神經網絡中,用於表示每一層的連接強度的矩陣 模型model描述神經元的連結方法 CNN(Convolutional Neural Network)圖像資料 (卷積神經網路) RNN(Recurrent Neural Network)時序資料 (循環神經網路 ) GAN(generative adversarial network)生成對抗網路 Tay racist 類神經網路偏執於單一目標 reinforcement learning(強化學習) AI玩遊戲 midjourney 很紅的 繪圖ai (discord) stable diffusion 開放原始碼的繪圖ai 免註冊 face reenactment 影片換臉建模 ## 5/31 phishing 網路釣魚(垃圾信件) spear phishing 魚叉式釣魚 RNN+GAN 產生假聲音 Cambridge analytica 劍橋分析:是一家進行資料探勘及數據分析的私人公司 economic of action: 例如 target advertisement(針對式廣告) dark ads 隱藏式廣告 lawrence lessig(勞倫斯·萊席格) 哈佛大學法學教授,談智慧財產權過度擴張--誰綁架了文化創意 copyfraud:用著作權行勒索詐騙。 Copyfraud and Other Abuses of Intellectual Property Law 作者:Jason Mazzone 科技保護措施 TPM(Technological Protection Measure):不能對手機(產品)進行逆向工程,否則犯法,針對硬體層次。 right to repair 維修權 長尾理論: Chris Anderson 帕雷托法則(Pareto's Principle):80%的結果來自20%的行動,也稱80 20法則 ## 6/7 五位不同領域專家用四個詞彙描述網路時代的同一個現象: - Herbert Simon: 注意稀有 - Michael Goldhaber: 注意力經濟 - Chris Anderson: reputation economy - 吳修銘: exposure culture - Eric Raymond: gift culture Lawrence Lessig 發明的 「創用CC」 (creative commons) 有四大元素: 「姓名標示」、「非商業」、「禁止改作」、「相同方式分享」 信譽經濟(reputation economy):長尾理論下後面的尾巴出現是為了提升名氣

    Import from clipboard

    Paste your markdown or webpage here...

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lose their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template has been removed or transferred.
    Upgrade
    All
    • All
    • Team
    No template.

    Create a template

    Upgrade

    Delete template

    Do you really want to delete this template?
    Turn this template into a regular note and keep its content, versions, and comments.

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password

    or

    By clicking below, you agree to our terms of service.

    Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in with Wallet
    Wallet ( )
    Connect another wallet

    New to HackMD? Sign up

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Help & Tutorial

    How to use Book mode

    Slide Example

    API Docs

    Edit in VSCode

    Install browser extension

    Contacts

    Feedback

    Discord

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions and GitHub Sync
    Get Full History Access

    • Edit version name
    • Delete

    revision author avatar     named on  

    More Less

    Note content is identical to the latest version.
    Compare
      Choose a version
      No search result
      Version not found
    Sign in to link this note to GitHub
    Learn more
    This note is not linked with GitHub
     

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub
        • Please sign in to GitHub and install the HackMD app on your GitHub repo.
        • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
        Learn more  Sign in to GitHub

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Include title and tags
        Available push count

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully