首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How to Fix the Internet A) We have to fix the internet. After 40 years, it has begun to corrode, both itself and us. It is still
How to Fix the Internet A) We have to fix the internet. After 40 years, it has begun to corrode, both itself and us. It is still
admin
2018-03-26
50
问题
How to Fix the Internet
A) We have to fix the internet. After 40 years, it has begun to corrode, both itself and us. It is still a marvelous and miraculous invention, but now there are bugs in the foundation, bats in the belfry, and trolls in the basement.
B) I do not mean this to be one of those technophobic rants insulting the internet for rewiring our brains to give us the nervous attention span of Donald Trump on Twitter or pontificating about how we have to log off and smell the flowers. Those worries about new technologies have existed ever since Plato was concerned that the technology of writing would threaten memorization and oratory (演讲术). I love the internet and all of its digital offshoots. What I feel sad for is its decline.
C) There is a bug in its original design that at first seemed like a feature but has gradually, and now rapidly, been exploited by hackers and trolls and malevolent actors: Its packets are encoded with the address of their destination but not of their authentic origin. With a circuit-switched network, you can track or trace back the origins of the information, but that’s not true with the packet-switched design of the internet.
D) Compounding this was the architecture that Tim Berners-Lee and the inventors of the early browsers created for the World Wide Web. It brilliantly allowed the whole of the earth’s computers to be webbed together and navigated through hyperlinks. But the links were one-way. You knew where the links took you. But if you had a webpage or piece of content, you didn’t exactly know who was linking to you or coming to use your content.
E) All of that protected the potential for anonymity. You could make comments anonymously. Go to a webpage anonymously. Consume content anonymously. With a little effort, send email anonymously. And if you figured out a way to get into someone’s servers or databases, you could do it anonymously.
F) For years, the benefits of anonymity on the net outweighed its drawbacks. People felt more free to express themselves, which was especially valuable if they were holding different opinions or hiding a personal secret. This was celebrated in the famous 1993 New Yorker cartoon, "On the Internet, nobody knows you’re a dog."
G) Now the problem is nobody can tell if you’re a troll. Or a hacker. Or a bot. Or a Macedonian (马其顿的) teenager publishing a story that the Pope has supported Trump. This has poisoned civil discourse, enabled hacking, permitted cyberbullying, and made email a risk.
H) The lack of secure identification and authentication (身份认证) inherent in the internet’s genetic code has also prevented easy transactions, obstructed financial inclusion, destroyed the business models of content creators, unleashed the overflow of spam (垃圾邮件), and forced us to use passwords and two-factor authentication schemes that would have confused Houdini. The trillions being spent and the IQ points of computer science talent being allocated to tackle security issues make it a drag, rather than a spur, to productivity in some sectors.
I) In Plato’s Republic, we learn the tale of the Ring of Gyges. Put it on, and you’re invisible and anonymous. The question that Plato asks is whether those who put on the ring will be civil and moral. He thinks not. The internet has proven him correct. The web is no longer a place of community, no longer a marketplace. Every day more sites are eliminating comments sections.
J) If we could start from scratch, here’s what I think we would do:
*Create a system that enables content producers to negotiate with aggregators (整合者) and search engines to get a royalty whenever their content is used, like ASCAP has negotiated for public performances and radio airings of its members’ works.
*Embed (嵌入) a simple digital wallet and currency for quick and easy small payments for songs, blogs, articles, and whatever other digital content is for sale.
*Encode emails with an authenticated return or originating address.
*Enforce critical properties and security at the lowest levels of the system possible, such as in the hardware or in the programming language, instead of leaving it to programmers to incorporate security into every line of code they write.
*Build chips and machines that update the notion of an internet packet. For those who want, their packets could be encoded or tagged with metadata (元数据) that describe what they contain and give the rules for how it can be used.
K) Most internet engineers think that these reforms are possible, from Vint Cerf, the original TCP/IP coauthor, to Milo Medin of Google, to Howard Shrobe, the director of cybersecurity at MIT. "We don’t need to live in cyber hell," Shrobe has argued. Implementing them is less a matter of technology than of cost and social will. Some people, understandably, will resist any reduction of anonymity, which they sometimes label privacy.
L) So the best approach, I think, would be to try to create a voluntary system, for those who want to use it, to have verified identification and authentication. People would not be forced to use such a system. If they wanted to communicate and surf anonymously, they could. But those of us who choose, at times, not to be anonymous and not to deal with people who are anonymous should have that right as well. That’s the way it works in the real world.
M) The benefits would be many. Easy and secure ways to deal with your finances and medical records. Small payment systems that could reward valued content rather than the current incentive to concentrate on clickbait for advertising. Less hacking, spamming, cyberbullying, trolling, and spewing of anonymous hate. And the possibility of a more civil discourse.
Public opposition could become one of the biggest obstacles to carrying out the reforms.
选项
答案
K
解析
K段定位句表明,实施这些改革,问题不存于技术,而在于成本和社会意愿。可以理解为,有些人会抵制对匿名的任何削减行为,因为他们有时把匿名称为隐私。定位句中的them指代该段第一句中提到的these reforms。由此推知,实施这些改革时遇到的主要问题是成本和社会意愿,而该段最后一句进一步解释了社会意愿就是指人们的抵制。题干中的Public opposition对应定位句中social will和resist;carrying out the reforms是定位句中Implementing them的同义转述,故K)为答案。
转载请注明原文地址:https://kaotiyun.com/show/2Ya7777K
0
大学英语四级
相关试题推荐
Thinkbeforeyoupost.Youmightnotbeawareofhowmuchinformationyou’re【C1】______.That’sthemessagefromthefounders
Thinkbeforeyoupost.Youmightnotbeawareofhowmuchinformationyou’re【C1】______.That’sthemessagefromthefounders
Thinkbeforeyoupost.Youmightnotbeawareofhowmuchinformationyou’re【C1】______.That’sthemessagefromthefounders
A、Theknowledgeofteachers.B、Thebehaviorsofstudents.C、Theprinciplesofschools.D、Theintroductionofbooks.A短文提到老师们需要有与
AsagroupofyoungAfricanimmigrantsstrugglestoadapttolifeintheUnitedStates,anafter-schooldramaprogramatWhiteO
HowtoSetupParentalControlsonaSmartphoneSaveyourkidsfromthedarksideoftheInternet.A)Kidsareal
HowtoSetupParentalControlsonaSmartphoneSaveyourkidsfromthedarksideoftheInternet.A)Kidsareal
HowtoSetupParentalControlsonaSmartphoneSaveyourkidsfromthedarksideoftheInternet.A)Kidsareal
InastepthatshouldhelpmaketheInternetsaferforconsumers,anti-virusgiantSymanteconWednesdaywillintroduceaprotec
随机试题
强心苷引起的传导阻滞可选用的治疗药物是
手背各指缝中的赤白肉际,左右共八穴足背各趾缝端凹陷中,左右共八穴
白前的功效是
A市药品监督管理部门在日常监督检查中,发现B药店存在违法经营行为,对其作出警告,限期整改,并处罚金3万元。B药店法人对此处罚不服,决定提出行政复议。下列不属于行政诉讼受案范围的是()
某油田开发建设工程中一新开发的区块位于西北干旱地区,区域面积30km2。新开发区块与已有区块相邻,依托已有联合站。开发建设工程设计年产油3.0×10tt,原油通过新建的70km管线输送至联合站,经脱水除气处理后外输,脱水除气过程产生的天然气不含硫,用作燃气
甲公司为工业企业,对投资性房地产采用成本模式进行后续计量。2×21年1月甲公司以出让的方式取得一宗土地使用权,支付价款为4000万元,预计使用年限为50年,准备建造写字楼,董事会作出了正式书面决议,明确表明建成后将其用于经营出租且持有意图短期内不再发生变化
以下不属于公司法人人格否认制度的适用情形为()。
某地大面积停水,影响居民正常用水,而此时有人传谣,说停水是因为化工厂有害物质泄漏,你怎么处理?
甲公司欠缴税款20万元,税务局工作人员小刘和小孙来甲公司查账时,甲公司总经理王某和其朋友李某组织一伙社会人员挡在公司门口不让税务人员进门,并将税务人员小刘打成重伤。王某的行为构成()
设u=u(x,y),v=v(x,y)有连续的一阶偏导数且满足条件:F(u,v)=0,其中F有连续的偏导数且
最新回复
(
0
)