Google Researchers Create AI That Builds Its Own Encryption
BY TOM BRANT OCTOBER 28, 2016 04:45PM EST
http://www.pcmag.com/news/349154/google-researchers-create-ai-that-builds-its-own-encryption
Alice and Bob have figured out a way to have a conversation without Eve being able to overhear, no matter how hard she tries.
They’re artificial intelligence algorithms created by Google engineers, and their ability to create an encryption protocol that Eve (also an AI algorithm) can’t hack is being hailed as an important advance in machine learning and cryptography.
Martin Abadi and David G. Andersen, explained in a paper published this week that their experiment is intended to find out if neural networks—the building blocks of AI—can learn to communicate secretly.
As the Abadi and Anderson wrote, “instead of training each of Alice and Bob separately to implement some known cryptosystem, we train Alice and Bob jointly to communicate successfully and to defeat Eve without a pre-specified notion of what cryptosystem they may discover for this purpose.”
same in German
Googles AI entwickelt eigenständig Verschlüsselung
Google-Forscher Martin Abadi und David G. Andersen des Deep-Learning-Projekts “Google Brain” eine neue Verschlüsselungsmethode entwickelt beziehungsweise entwickeln lassen. Die Forscher haben verschiedene neurale Netze damit beauftragt, eine abhörsichere Kommunikation aufzustellen.
++++++++++++++++
more on AI in this IMS blog:
https://blog.stcloudstate.edu/ims?s=artificial+intelligence
Wiklund, M., Mozelius, P., Westing, T., & Norberg, L. (2016). Biometric Belt and Braces for Authentication in Distance Education. Retrieved from
https://www.researchgate.net/publication/309548915_Biometric_Belt_and_Braces_for_Authentication_in_Distance_Education
Abstract
a need for new techniques to handle the problem in online environments. To achieve zero cheating is hard (or impossible) without repelling not only cheaters but also those students who do not cheat, where a zero ‐ tolerance emphasis also would risk inhibiting students’ intrinsic motivation. Several studies indicate that existing virtual learning environments do not provide the features needed to control that the intended student is the one taking the online exam. Biometric Belt and Braces for Authentication in Distance Education.
One approach to prevent student’s dishonesty is the university code of honour. This is a set of rules describing what actions are not permitted and the consequences for students taking such actions. Another way of preventing cheating is the use of proctors during written exams. Even while using such codes of honour and proctors, universities still have found many students to cheat. Biometric Belt and Braces for Authentication in Distance Education.
Neutralisation is the phenomenon when a person rationalises his or her dishonest behaviour with arguments like “I can do this because the work load within this course is just too overwhelming” or “I can do this because I have a half ‐ time job on the side which gives me less study time than the other students have”. By doing so the student puts the blame for cheating on external factors rather than on himself, and also protects himself from the blame of others (Haines et al. 1986). This neutralises the behavior in the sense that the person’s feelings of shame are reduced or even eliminated. Haines et al. (1986 Biometric Belt and Braces for Authentication in Distance Education.
Simply asking participants to read a code of honour when they had the opportunity to cheat reduced dishonesty. Also whether one signed the code of honour or just read it influenced cheating. The Shu et al. (2011) study suggests that opportunity and knowledge of ethical standards are two factors that impact students’ ethical decision about cheating. This is in line with the results in (McCabe, Trevino and Butterfield 2001), showing that if students regularly are reminded of the university’s code of honour, they are less likely to cheat Biometric Belt and Braces for Authentication in Distance Education.
For an online course setting, Gearhart (2001) suggest that teachers should develop a guideline for “good practices”.
In online examination there are reports of students hiring other persons to increase their scores (Flior & Kowalski, 2010) and there is a need for new enhanced authentication tools (Ullah, Xiao & Lilley, 2012). For companies and Internet environments the process of authentication is often completed through the use of logon identification with passwords and the assumption of the password to guarantee that the user is authentic (Ramzan, 2007), but logins and passwords can be borrowed (Bailie & Jortberg, 2009). The discussion on how to provide enhanced authentication in online examination has led to many suggested solutions; four of them are: Biometric Belt and Braces for Authentication in Distance Education.
- Challenge Questions: with questions based on third ‐ party data
- Face ‐ to ‐ Face Proctored Exam: with government or institution issued identification
- Web Video Conference Proctor: audio and video conference proctoring via webcam and screen monitoring service with live, certified proctors
- Biometrics and Web Video Recording: with unique biometrics combined with the recording of student in exam via webcam
An idea for online courses is that assessment should not only be a one way process where the students get grades and feedback. The examination process should also be a channel for students’ feedback to teachers and course instructors (Mardanian & Mozelius, 2011). New online methods could be combined with traditional assessment in an array of techniques aligned to the learning outcomes (Runyon and Von Holzen, 2005). Examples of summative and formative assessment in an online course could be a mix of: Biometric Belt and Braces for Authentication in Distance Education.
- Multiple choice questions (MCQ) tests, automatically corrected in a virtual learning environment
- Term papers or essays analysed by the course instructors
- Individual or group assignments posted in digital drop ‐ boxes
- Oral or written tests conducted in the presence of the instructor or through videoconferences (Dikli, 2003)
Authors’ suggestion is a biometric belt and braces model with a combination of scanned facial coordinates and voice recognition, where only a minimum of biometric data has to be stored. Even if the model is based on biometrics with a medium to low grade of uniqueness and permanence, it would be reliable enough for authentication in online courses if two (or more) types of biometrics are combined with the presented dialogue based examination using an interaction/obser ‐ vation process via web cameras. Biometric Belt and Braces for Authentication in Distance Education.
++++++++++++++++++
more on identification in this IMS blog
https://blog.stcloudstate.edu/ims?s=identification
++++++++++++++++
more on proctoring and detecting cheating:
http://www.wgu.edu/blogpost/innocent-red-flags-caught-by-online-exam-proctors
voices from the other side:
http://infoproc.blogspot.com/2013/04/how-to-cheat-online-exam-proctoring.html
https://campustechnology.com/articles/2016/04/06/how-students-try-to-bamboozle-online-proctors.aspx
http://www.usnews.com/education/online-education/articles/2014/06/17/think-twice-before-cheating-in-online-courses
In the wake of NMC release regarding digital literacy, https://blog.stcloudstate.edu/ims/2016/10/25/nmc-on-digital-literacy/ (not coincidence, the author is active with NMC)
ALA is offering a webinar:
Rethinking Digital Literacy to Serve Library Staff and Users eCourse
Paul Signorelli Item Number: 1541-9124
http://www.alastore.ala.org/detail.aspx?ID=11469&zbrandid=4634&zidType=CH&zid=38811756&zsubscriberId=1026665847&zbdom=http://ala-publishing.informz.net
Asynchronous eCourse beginning November 14, 2016 and continuing for 5 weeks (includes an extension of 1 week for Thanksgiving)
Estimated Hours of Learning: 24
Certificate of Completion available upon request
Learning outcomes
After participating in this course, you will be able to:
- incorporate ever-evolving definitions of digital literacy into learning opportunities
- draw upon a variety of digital resources to create digital-learning opportunities
- seek additional resources that you can use in your continuing efforts to keep up with new developments in digital literacy in libraries and other learning organizations
What is digital literacy? Do you know how you can foster digital literacy through formal and informal learning opportunities for your library staff and users?
Supporting digital literacy still remains an important part of library staff members’ work, but sometimes we struggle to agree on a simple, meaningful definition of the term. In this four-week eCourse, training/learning specialist Paul Signorelli will begin by exploring a variety of definitions, focusing on work by a few leading proponents of the need to foster digital literacy among people of all ages and backgrounds. He will explore a variety of digital-literacy resources – including case studies of how we creatively approach digital-literacy learning opportunities for library staff and users, and will explore a variety of digital tools that will help to encourage further understanding of this topic.
Now, who is ready to build their digital-literacy skills and help their users become digital literate as well?
eCourse Outline
Part 1: Digital Literacy: Initial Definitions and Explorations
- An overview of various definitions of digital literacy
- Several components of digital literacy
- Exploring Doug Belshaw’s extensive work on defining and fostering digital literacy
Part 2: Digital Literacy: Crap Detection and Other Skills and Tools
- Exploring Howard Rheingold’s approach to crap detection and other digital literacy/net literacy skills
- Participation, collaboration, creativity, and experimentation as digital-literacy skills
- Building our digital-literacy toolkit
Part 3: Digital Literacy in Learning
- The varying digital literacy needs of our youngest students, of teens, and of adults
- Exploring various online resources supporting our digital-literacy training-teaching-learning efforts
- The myth of the digital native
Part 4: Fostering Digital Literacy: Creating Within a Digital Environment
- Creating a framework to promote digital literacy
- Designing workshops and other learning opportunities
- Keeping up in an evolving digital literacy landscape
How this eCourse Works
The eCourse begins on Monday, November 14, 2016. Your participation will require approximately six hours a week, at times that fit your schedule. All activities take place on the website, and you will be expected to:
- Read, listen to or view online content
- Post to online discussion boards
- Complete weekly assignments or activities
Instructor Paul Signorelli will monitor discussion boards regularly during the four-week period, lead group discussions, and will also answer individual questions. All interaction will take place on the eCourse site, which will be available 24 hours a day, 7 days a week. It’s recommended that students log into the site on the first day of class or within a few days for an overview of the content and to begin the first lesson.
User Requirements
Participants will need regular access to a computer with an internet connection for online message boards participation, viewing online video, listening to streaming audio (mp3 files), and downloading and viewing PDFs and PowerPoint files. ALA Editions eCourses are fully compatible with Windows and MacOs.
About the Instructor
Paul Signorelli, co-author of Workplace Learning & Leadership with Lori Reed, is a San Francisco-based writer, trainer, presenter, and consultant exploring, fostering, and documenting innovations in learning. Having earned an MLIS through the University of North Texas (with an emphasis on online learning), he remains active in the American Library Association, the New Media Consortium (educational technology), and the Association for Talent Development (formerly the American Society for Training & Development).
My note: Finally ALA is addressing a huge gap. Namely, letting conservative librarians dress information literacy with the appearance of “digital literacy.”
++++++++++++++++
more on digital literacy in this IMS blog:
Hackers are able to seize control of consumer drones and make them fall from the sky
there aren’t clear rules about what manufacturers need to do to secure drones to prevent them from being tampered with by malicious hackers.
Police have owned signal jamming tools to interfere with consumer drones for years. After all, it was a regular consumer drone that a member of ISIS turned into a kamikaze to bomb Kurdish fighters.
My note: from jamming devices, to raptors (birds) to hacking the apps – #BumpyRoad for drones
+++++++++++++++++
more on drones in this IMS blog:
https://blog.stcloudstate.edu/ims?s=drones
Zcash (ZEC), the new digital currency lauded for its privacy features, is launching today amidst some massive hype. But until enough tokens become available on exchanges, Zcash enthusiasts are poised to acquire their ZEC first-hand by mining for it, either by setting up a home rig or by signing up for a cloud mining contract.
https://plus.google.com/+PatrickUlrich/posts/JEKNvhvwUHZ
++++++++++++++++++++++++++
more on bitcoin and digital currency in this IMS blog:
https://blog.stcloudstate.edu/ims?s=bitcoin