首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How to Fix the Internet A) We have to fix the internet. After 40 years, it has begun to corrode, both itself and us. It is still
How to Fix the Internet A) We have to fix the internet. After 40 years, it has begun to corrode, both itself and us. It is still
admin
2018-03-26
45
问题
How to Fix the Internet
A) We have to fix the internet. After 40 years, it has begun to corrode, both itself and us. It is still a marvelous and miraculous invention, but now there are bugs in the foundation, bats in the belfry, and trolls in the basement.
B) I do not mean this to be one of those technophobic rants insulting the internet for rewiring our brains to give us the nervous attention span of Donald Trump on Twitter or pontificating about how we have to log off and smell the flowers. Those worries about new technologies have existed ever since Plato was concerned that the technology of writing would threaten memorization and oratory (演讲术). I love the internet and all of its digital offshoots. What I feel sad for is its decline.
C) There is a bug in its original design that at first seemed like a feature but has gradually, and now rapidly, been exploited by hackers and trolls and malevolent actors: Its packets are encoded with the address of their destination but not of their authentic origin. With a circuit-switched network, you can track or trace back the origins of the information, but that’s not true with the packet-switched design of the internet.
D) Compounding this was the architecture that Tim Berners-Lee and the inventors of the early browsers created for the World Wide Web. It brilliantly allowed the whole of the earth’s computers to be webbed together and navigated through hyperlinks. But the links were one-way. You knew where the links took you. But if you had a webpage or piece of content, you didn’t exactly know who was linking to you or coming to use your content.
E) All of that protected the potential for anonymity. You could make comments anonymously. Go to a webpage anonymously. Consume content anonymously. With a little effort, send email anonymously. And if you figured out a way to get into someone’s servers or databases, you could do it anonymously.
F) For years, the benefits of anonymity on the net outweighed its drawbacks. People felt more free to express themselves, which was especially valuable if they were holding different opinions or hiding a personal secret. This was celebrated in the famous 1993 New Yorker cartoon, "On the Internet, nobody knows you’re a dog."
G) Now the problem is nobody can tell if you’re a troll. Or a hacker. Or a bot. Or a Macedonian (马其顿的) teenager publishing a story that the Pope has supported Trump. This has poisoned civil discourse, enabled hacking, permitted cyberbullying, and made email a risk.
H) The lack of secure identification and authentication (身份认证) inherent in the internet’s genetic code has also prevented easy transactions, obstructed financial inclusion, destroyed the business models of content creators, unleashed the overflow of spam (垃圾邮件), and forced us to use passwords and two-factor authentication schemes that would have confused Houdini. The trillions being spent and the IQ points of computer science talent being allocated to tackle security issues make it a drag, rather than a spur, to productivity in some sectors.
I) In Plato’s Republic, we learn the tale of the Ring of Gyges. Put it on, and you’re invisible and anonymous. The question that Plato asks is whether those who put on the ring will be civil and moral. He thinks not. The internet has proven him correct. The web is no longer a place of community, no longer a marketplace. Every day more sites are eliminating comments sections.
J) If we could start from scratch, here’s what I think we would do:
*Create a system that enables content producers to negotiate with aggregators (整合者) and search engines to get a royalty whenever their content is used, like ASCAP has negotiated for public performances and radio airings of its members’ works.
*Embed (嵌入) a simple digital wallet and currency for quick and easy small payments for songs, blogs, articles, and whatever other digital content is for sale.
*Encode emails with an authenticated return or originating address.
*Enforce critical properties and security at the lowest levels of the system possible, such as in the hardware or in the programming language, instead of leaving it to programmers to incorporate security into every line of code they write.
*Build chips and machines that update the notion of an internet packet. For those who want, their packets could be encoded or tagged with metadata (元数据) that describe what they contain and give the rules for how it can be used.
K) Most internet engineers think that these reforms are possible, from Vint Cerf, the original TCP/IP coauthor, to Milo Medin of Google, to Howard Shrobe, the director of cybersecurity at MIT. "We don’t need to live in cyber hell," Shrobe has argued. Implementing them is less a matter of technology than of cost and social will. Some people, understandably, will resist any reduction of anonymity, which they sometimes label privacy.
L) So the best approach, I think, would be to try to create a voluntary system, for those who want to use it, to have verified identification and authentication. People would not be forced to use such a system. If they wanted to communicate and surf anonymously, they could. But those of us who choose, at times, not to be anonymous and not to deal with people who are anonymous should have that right as well. That’s the way it works in the real world.
M) The benefits would be many. Easy and secure ways to deal with your finances and medical records. Small payment systems that could reward valued content rather than the current incentive to concentrate on clickbait for advertising. Less hacking, spamming, cyberbullying, trolling, and spewing of anonymous hate. And the possibility of a more civil discourse.
To adopt the voluntary system would be advantageous to our online life in a number of aspects.
选项
答案
M
解析
M段第一句表明上文提到的自愿系统好处很多,后四句则从四个方面列举了自愿系统给我们的网络生活带来的好处。它是处理资产和医疗记录简便安全的方法;是奖赏有价值内容的小额支付系统,而不是当前集中于广告点击的刺激手段;减少了黑客行为、垃圾邮件、网络欺凌、钓鱼诈骗和匿名泄愤;还可能带来更加义明的言论。题下中的advantageous和a number of分别对应定佗句巾的benefits和many,题干是对该段内容的概括,故M)为答案。
转载请注明原文地址:https://kaotiyun.com/show/QYa7777K
0
大学英语四级
相关试题推荐
Thinkbeforeyoupost.Youmightnotbeawareofhowmuchinformationyou’re【C1】______.That’sthemessagefromthefounders
A、Ittastesthesameasthepast.B、Itisnotrefreshingnow.C、Itcan’tcureheadaches.D、Itismuchcheaperthanbefore.C短文提到
AsagroupofyoungAfricanimmigrantsstrugglestoadapttolifeintheUnitedStates,anafter-schooldramaprogramatWhiteO
AsagroupofyoungAfricanimmigrantsstrugglestoadapttolifeintheUnitedStates,anafter-schooldramaprogramatWhiteO
AsagroupofyoungAfricanimmigrantsstrugglestoadapttolifeintheUnitedStates,anafter-schooldramaprogramatWhiteO
HowtoSetupParentalControlsonaSmartphoneSaveyourkidsfromthedarksideoftheInternet.A)Kidsareal
HowtoSetupParentalControlsonaSmartphoneSaveyourkidsfromthedarksideoftheInternet.A)Kidsareal
InastepthatshouldhelpmaketheInternetsaferforconsumers,anti-virusgiantSymanteconWednesdaywillintroduceaprotec
InastepthatshouldhelpmaketheInternetsaferforconsumers,anti-virusgiantSymanteconWednesdaywillintroduceaprotec
InastepthatshouldhelpmaketheInternetsaferforconsumers,anti-virusgiantSymanteconWednesdaywillintroduceaprotec
随机试题
电动机的定额是指()。
下列关于原子吸收法操作描述正确的是()。
患者,男性,25岁。面部、躯干部起白斑1个月,无明显诱因。其父亲曾有同样病史。查体:面部、躯干部可见大小不等不规则的色素脱失斑,白斑周围有色素沉着。该病的发病机制可能是
慢性盆腔炎时输卵管卵巢病理变化不包括
A县药品稽查人员在该县的一村卫生室进行监督检查,现场查获标示为B省的大众生物科技有限公司生产的金银花百合片和乌梢蛇桔梗胶囊等8种产品,共计6000盒,这些产品所含成分与国家药品标准规定的成分不符。A县公安局经立案侦查发现,B省的大众生物科技有限公司是两年
证券投资是指投资者(法人或自然人)购买股票、债券、基金券等有价证券以及这些有价证券的衍生品,以获取红利、利息及资本利得的投资行为和投资过程,是间接投资的重要形式。( )
甲国有企业拟利用英国乙公司的投资将其全资拥有的丙国有独资公司(下称丙公司)改组为中外合资经营企业。甲企业在与乙公司协商后,拟订的有关改组方案中有关要点如下:(1)改组前的丙公司注册资本5000万元人民币。甲企业拟将丙公司60%的股权转让给乙公司,转让价
文某欲买房,张某欲卖房,两人协商过程中,张某坚持单价为一万元,文某坚持八千元,双方未能达成一致。一日,文某见张某患病无力,迫使张某在准备好的合同上签字。关于文某的行为违背哪项民法原则,下列正确的是()。
在20世纪80年代,海洛因服用者就诊医院急诊室的次数增加了25%以上。因此很明显,在那个10年中海洛因的服用量在增加。如果假设下面哪一项,作者的结论可被合理地推出?
下列不属于数据库管理员(简称DBA)的职责的是
最新回复
(
0
)