User:Zuhui//Personal Reader/Beyond Follows: Trust In Computing: Difference between revisions
No edit summary |
m (Zuhui moved page User:Zuhui//notes/๐/Beyond Follows: Trust In Computing to User:Zuhui//Personal Reader/Beyond Follows: Trust In Computing) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
[https://march.international/beyond-follows-trust-in-computing/ Beyond Follows:Trust in Computing by Sarah Friend] | [https://march.international/beyond-follows-trust-in-computing/ Beyond Follows:Trust in Computing by Sarah Friend] | ||
<br>Recommended by Manetta, I really like the text. It overlaps with my interest in how technology is designed to shape our trust in information from journalistic media to online communities, and its consequence. | <br>(also look for: Computing with Trust: Definition, Properties, and Algorithms by Jennifer Golbeck)<br><br>Recommended by Manetta, I really like the text. It overlaps with my interest in how technology is designed to shape our trust in information from journalistic media to online communities, and its consequence. | ||
The text analyzes how we build and show trust in the digital space, and how trust models change depending on how we consume information. author suggests that by examining network structures, we can notice common patterns across different technological contexts, which can lead to better model and understanding the choices we face. also | The text analyzes how we build and show trust in the digital space, and how trust models change depending on how we consume information. author suggests that by examining network structures, we can notice common patterns across different technological contexts, which can lead to better model and understanding the choices we face. also |
Latest revision as of 08:52, 4 February 2025
Beyond Follows:Trust in Computing by Sarah Friend
(also look for: Computing with Trust: Definition, Properties, and Algorithms by Jennifer Golbeck)
Recommended by Manetta, I really like the text. It overlaps with my interest in how technology is designed to shape our trust in information from journalistic media to online communities, and its consequence.
The text analyzes how we build and show trust in the digital space, and how trust models change depending on how we consume information. author suggests that by examining network structures, we can notice common patterns across different technological contexts, which can lead to better model and understanding the choices we face. also stresses the need for more elaborate systems to better reflect trust quality.
Trust is a felt quality of human relations, ephemeral and changing.
To turn trust into data might seem wrong, like pinning the butterfly โ but the butterfly is getting pinned all the time.
When you follow someone on Twitter or upvote someoneโs post on Reddit, semantically these are both small gestures of trust for the person being followed or for the post. To parrot Guy Debord, social media is not a series of interactions with technology, it is a social relation among people, mediated by technology.
From reciprocal to directed trust
What has changed about us as people using the internet that leads from reciprocal to directed trust?
When we see reciprocal trust in platforms created more recently, it is often because they make no attempt at being publicly browsable. Trust is still treated as reciprocal when we imagine the accounts weโre trusting as contacts; they map loosely onto โpeopleโ (i.e.,accounts) and are treated like an online extension of who we know in real life.
Trust is directed when we have shifted from trusting people to trusting information (or wanting to see content) shared by people. The shift from trusting people to trusting information, and from reciprocal to directed trust, may lead to increasing inequality in the distribution of attention.
binary and weighted trust
Binary form of trust, meaning trust is either present or it is not.
We see binary trust on most major social media networks. I either follow you or I do not.
With this model, there is no gray middle ground of trust, and the platform allows no expressive potential for the quality of trust.
The alternative is weighted trust, which most people are familiar with in the context of a rating system (like uber, amazon, even rotten tomato etc).
PGP(pretty good privacy), Web of Trust
Possibly the oldest formalized example of a weighted trust network is also one of the oldest formalized trust networks, period. Itโs called the web of trust and originated with PGP. Created in 1991, PGP stands for Pretty Good Privacy and is a tool for encrypting messages like emails. It was designed to be able to keep communication secret without a central authority to verify identity and therefore aid trust.
This web of trust allows everyone to see who is trusted, and by whom, so they can better make decisions about which accounts to trust themselves.
global and local trust
The concepts of โglobal trustโ and โlocal trustโ each have their own advantages and disadvantages.
(basically when the scope of trust is either too broad or too narrow)
also, they represent two perspectives on how we perceive and build trust in one another.
๊ธ๋ก๋ฒ ์ ๋ขฐ
- ๋คํธ์ํฌ์ ์ ์ฒด์ ์ธ ์๊ฐ์์ ํน์ ๊ฐ์ธ์ด๋ ์ ๋ณด์ ์ ๋ขฐ๋๋ฅผ ํ๊ฐ
- "๋๊ฐ ๋ณด๋๋ผ๋ ์ ๋ขฐํ ์ ์๋ ๊ณตํต๋ ๊ธฐ์ค"์ ์๋ฏธํ๋ฉฐ, ๊ธ๋ก๋ฒ ์์ค์์ ๊ฒ์ฆ๋ ์ ๋ณด(์: ์ ๋ช ๋ฏธ๋์ด, ๊ณต์ธ ๊ธฐ๊ด)๋ฅผ ํฌํจ
- ์: ๊ตฌ๊ธ์์ โ์ ๋ขฐํ ๋งํ ๋ด์คโ๋ก ํ์๋๋ ์ฝํ
์ธ , ์์
๋ฏธ๋์ด๋ฑ์์ ์ธ์ฆ ๋ฐฐ์ง๋ฅผ ๋ฐ์ ๊ณ์
๋ก์ปฌ ์ ๋ขฐ
- ๋คํธ์ํฌ ๋ด์์ ๊ฐ๋ณ ๋ ธ๋(์ฌ์ฉ์)๊ฐ ์์ ์ ์ง์ ์ ์ธ ๊ด๊ณ๋ฅผ ํตํด ์ ๋ขฐ๋ฅผ ํ์ฑ
- "๊ฐ์ธ์ ๊ฒฝํ๊ณผ ๊ด๊ณ๋ฅผ ๋ฐํ์ผ๋ก ํ ์ ๋ขฐ"์ด๋ฉฐ, ํน์ ์ง๋จ์ด๋ ๊ณต๋์ฒด์์๋ง ์ ๋ขฐํ ์ ์๋ ๋์(์: ์น๊ตฌ, ๊ฐ์กฑ, ์ง์ญ ์ปค๋ฎค๋ํฐ)
- ์: ์ง์ญ ์ปค๋ฎค๋ํฐ์ ์ถ์ฒ, ์น๊ตฌ ์ถ์ฒ ์์คํ
๋น์ ํ์๋ฉด, ๊ธ๋ก๋ฒ ์ ๋ขฐ๋ "์ธ๊ณ์ ์ผ๋ก ์ ๋ช ํ ์์์ ์ ํ์ "๊ณผ ๊ฐ๊ณ , ๋ก์ปฌ ์ ๋ขฐ๋ "๋ด๊ฐ ์์ฃผ ๊ฐ๋ ๋๋ค ๋ง์ง์ ํํ"๊ณผ ๊ฐ๋ค.
global trust and Sybil attacks
How might one calculate a global trust score? The simplest way would be to add up all the records of inbound trust and find an average, but this would be easy to manipulate. In the case of PageRank, that could look like creating thousands of simple web pages that do nothing but link back to a page youโre trying to boost.
Attempts to hijack a network and artificially inflate the seeming importance of one node are called, in the general form, Sybil attacks. Any system that wants to use a global trust score must have defenses against them.
Sybil attacks are the reason some blockchains use energy-intensive mining algorithms, or proof of work. The high energy use makes the creation of many โfakeโ identities useless, since ability to control the network isnโt tied to the quantity of fake identities but instead to their computational power, which has a material cost. While there are, of course, environmental externalities outside the scope of this article and also alternate solutions to the Sybil problem, proof of work is one of the ways to make this kind of attack prohibitively expensive.
transivity and subjectivity
Each node in a network has a location and a local view of trust. We can think of the utility of shifting between global and local as a question about โhow transitive we think trust isโ and, secondarily, what kinds of subjectivities are involved in the networkโs particular semantic meaning of trust.
์ ์ด์ฑ
A๊ฐ B๋ฅผ ์ ๋ขฐํ๊ณ , B๊ฐ C๋ฅผ ์ ๋ขฐํ๋ค๋ฉด, A๋ C๋ฅผ ์ ๋ขฐํ ์ ์์๊น?
if I trust you, do I also trust the people you trust?
Or do I trust them less than I trust you, but still a little?
How many levels outward does my trust ripple before it has fully dissipated?
๊ธ๋ก๋ฒ ์ ๋ขฐ์ ์ ์ด์ฑ
- ๊ธ๋ก๋ฒ ์ ๋ขฐ ๋ชจ๋ธ์์๋ ํน์ ์ ๋ขฐํ ๋งํ ๊ธฐ๊ด(์ ๋ถ, ๋๊ธฐ์ , ๋ฏธ๋์ด)์ด ์ ๋ขฐํ๋ฉด, ๋ค์์ ์ฌ๋๋ค์ด ์ด๋ฅผ ์๋์ผ๋ก ๋ฐ์๋ค์ธ๋ค. ๊ทธ๋ฌ๋ ์ ๋ขฐ์ ์ ์ด์ฑ์ด ๊ฐํ๋ฉด ๊ฒ์ฆ ์์ด ์๋ชป๋ ์ ๋ณด๊ฐ ํ์ฐ๋ ์ํ์ด ์์.
๋ก์ปฌ ์ ๋ขฐ์ ์ ์ด์ฑ
- ๋ก์ปฌ ์ ๋ขฐ๋ ๊ด๊ณ ๊ธฐ๋ฐ์ผ๋ก ํ์ฑ๋๋ฏ๋ก ์ ์ด์ฑ์ด ์ ํ์ ์ด๋ค. ("๋ด ์น๊ตฌ๊ฐ ์ถ์ฒํ ์ฌ๋์ ์ ๋ขฐํ ์ ์์๊น?" - ์ง์ ์ ์ธ ๊ฒฝํ์ด ์์ผ๋ฉด ์ ๋ขฐํ์ง ์์ ๊ฐ๋ฅ์ฑ์ด ํผ). ์ ๋ขฐ์ ๋ฒ์๊ฐ ์ ํ์ ์ด๋ฉฐ ์๋ก์ด ๊ด๊ณ ํ์ฑ์ด ์ด๋ ค์ธ ์ ์์.
์ ๋ขฐ์ ์ ์ด์ฑ์ ๋๊ฒ ํ๊ฐํ ์๋ก ๊ธ๋ก๋ฒ ์ ๋ขฐ๋ ๊ฐํด์ง๊ณ , ๋ฐ๋๋ก ์ ์ด์ฑ์ด ๋ฎ๋ค๋ฉด ๋ก์ปฌ ์ ๋ขฐ์ ์ค์์ฑ์ด ๋ ์ปค์ง๊ฒ ๋๋ค.
์ฃผ๊ด์ฑ
์ ๋ขฐ๋ ๋งค์ฐ ์ฃผ๊ด์ ์ธ ์์๋ฅผ ํฌํจํ๋ฉฐ, ๊ทธ ์๋ฏธ๊ฐ ์ฌ๋๋ง๋ค ๋ค๋ฅผ ์ ์๋ค.
๊ธ๋ก๋ฒ ์ ๋ขฐ์ ์ฃผ๊ด์ฑ ๋ฌธ์
- ๊ธ๋ก๋ฒ ์ ๋ขฐ๋ ๋ค์์ ํ๊ฐ๋ ๊ณตํต๋ ๊ธฐ์ค์ ๋ฐ๋ฅด๊ธฐ ๋๋ฌธ์, ๊ฐ๊ฐ์ธ์ ๊ฐ์น๋ ์ ํธ๊ฐ ๋ฌด์๋ ์ ์๋ค. ๋ฌธํ์ ์ฐจ์ด์ ๊ฐ์ธ์ ์ ๋ ์ด ๋ฐ์๋์ง ์๋ ํ์ผ์ ๋ชจ๋ธ์ด๊ธฐ ๋๋ฌธ. ๊ฐ๋ น, ๊ธ๋ก๋ฒํ ์ ๋ขฐ ์ ์๊ฐ ๋์ ์ธ๋ฌผ์ด ํน์ ๋ฌธํ๊ถ์์๋ ์ ๋ขฐ๋ฐ์ง ๋ชปํ ์ ์๋ ๊ฒ๊ณผ ๊ฐ์(์ ๋ช ์ ์น์ธ์ด ํน์ ๊ตญ๊ฐ์์๋ง ๋ถ์ ๋ฐ๋ ๊ฒฝ์ฐ).
๋ก์ปฌ ์ ๋ขฐ์ ์ฃผ๊ด์ฑ ๋ฌธ์
- ๋ก์ปฌ ์ ๋ขฐ๋ ๊ฐ์ธ์ ๊ฒฝํ์ ์ํด ํ์ฑ๋๋ฏ๋ก ๊ฐ๊ด์ฑ์ด ๋ถ์กฑํ ์ ์๋ค.(๊ฐ๋ น, ํน์ ๊ทธ๋ฃน์์๋ ์ ์๋ ค์ง ์ฌ๋์ด์ง๋ง, ๋ค๋ฅธ ์ปค๋ฎค๋ํฐ์์๋ ์์ ํ ์ ๋ขฐํ ์ ์๋ ์กด์ฌ์ผ ์ ์๋ ๊ฒฝ์ฐ) ์ด๋ ์ ๋ขฐ์ ์ ์ฉ ๋ฒ์๊ฐ ์ ํ๋๋ฉฐ, ์ธ๋ถ์ธ์๊ฒ ์ ๋ขฐ๋ฅผ ํ์ฅํ๊ธฐ ์ด๋ ค์.
questions
overall, the problem of local trust is that range is very limited, also could easily create filter bubble.
whereas global trust is fast spread and has wide range of coverage but it flattens individuality.
It seems possible that too much globality in terms of trust leads to loss of granularity and silencing of difference, and too much locality leads to a disturbing filter-bubble effect.
Some questions: Is a possible mitigator of polarization to make trust more transitive? And more philosophically, is the concept of a global trust score in some ways always embedding a singular concept of truth into the systems that use it?