Categories
Dedicated Server

Discord users can soon verify their identities with linked accounts – Engadget

Discord is expanding on Connections, a feature that allows users to show what music they're listening to (among other things), by providing a way for folks to verify their identity using accounts on other platforms. Starting in the next few weeks, admins will be able to offer dedicated server roles to users who have authenticated profiles with accounts elsewhere.

The core idea behind these Linked Roles is to provide a stronger sense of trust. The platforms that support this feature at the outset are Xbox, PlayStation, Steam, Epic Games, Battle.net, League of Legends, Riot Games, Reddit, TikTok, Twitter, YouTube, Twitch, Instagram, Spotify, Facebook, GitHub, Crunchyroll, PayPal and eBay. Discord bots for Destiny 2 (Charlemagne) and Roblox (Bloxlink) support Linked Roles too.

Discord

You can show these connected accounts on your Discord profile, along with certain details like your follower count or eBay seller feedback rating. If you're selling your art on Discord, for instance, you can indicate to potential customers that the work on a DeviantArt profile is actually yours, since the accounts will be linked. Discord admins and moderators can also choose to offer server roles with perks, such as access to certain channels, to users who authenticate their accounts with Connections and meet various conditions.

Admins will be able to select the parameters for unlocking Linked Roles. They can stipulate, for instance, that a user needs to link to a Steam account that's a certain number of days old and/or has a minimum number of Dota 2 or Team Fortress 2 items to show that they're genuine players. From a server's dropdown menu, users will be able to view the requirements for each Linked Role. Each role will automatically be granted to their profiles when they meet the conditions.

Discord

Discord is keeping privacy in mind here. Admins and moderators won't automatically gain access to info from your Connections even if you've already linked accounts before joining a server. You'll need to manually opt-in to a server's Linked Roles before details from your connected accounts are accessible. Moreover, if you're eligible, you can snag a Linked Role on a server without having to show any details from your Connections on your profiles. Discord can handle things on the back end without admins or moderators being able to see your info.

Linked Roles build on previous Connections features, such as being able to show off whatever Xbox or PlayStation game you're playing on your Discord profile. Discord is rolling out Linked Roles at a time when Twitter is upending its approach to account verification. Cross-platform authentication can help to verify a person's identity. You'll be able to tell, for instance, if a Discord profile actually belongs to a big name Instagram, YouTube or TikTok creator thanks to those accounts being linked.

Discord

Meanwhile, Discord is starting to roll out green checkmarks next to Connections for certain services. The icon will show that the connected app is from a vetted developer. Discord says this will "help establish an important level of trust between apps from developer partners and the millions of users who interact with those apps every day across Discord."

As of today, 22 of these "official" apps are available. Next year, Discord will start offering an application process for developers who want to have their apps designated as official. In the meantime, using a new API, developers can create or update apps to support Connections features.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission. All prices are correct at the time of publishing.

More:

Discord users can soon verify their identities with linked accounts - Engadget

Categories
Dedicated Server

Microsoft to Fix New Bug Breaking Hyper-V VMs in Windows Server – Petri.com

Earlier this week, Microsoft released the December 2022 Patch Tuesday updates for various supported versions of Windows. Now, the company has warned that the latest Windows Server updates could prevent IT admins from creating new virtual machines (VMs) in some Hyper-V hosts.

After installing KB5021249 on Hyper-V hosts managed by Software Defined Networking (SDN) configured System Center Virtual Machine Manager (VMM), you might receive an error on workflows involving creating a new Network Adapter (also called a Network Interface Card or NIC) joined to a VM network or a new Virtual Machine (VM) with a Network Adapter joined to a VM network, Microsoft explained on the Windows Health Dashboard.

Specifically, IT admins could encounter Ethernet connection errors while creating a new virtual machine or a network adapter on an existing virtual machine. Additionally, these errors might appear when the SLB Load Balancer or SDN RAS Gateway services fail. Administrators may also see Ethernet connection warning messages during live migrations of non-highly available VMs.

The issue only affects new network adapters created after installing the latest Patch Tuesday updates (KB5021237 and KB5021249) on Windows Server 2019 and Windows Server 2022. However, it doesnt cause connection issues for existing VMs with network adapters.

Thankfully, Microsoft says that its engineers are currently working on a fix that should be arriving in the near future. As a workaround, Microsoft suggests users to run the following commands in PowerShell with administrator privileges:

$lang = (Get-WinSystemLocale).NameC:Windowssystem32wbemmofcomp.exe C:Windowssystem32wbem$langVfpExt.mflC:Windowssystem32wbemmofcomp.exe C:Windowssystem32wbemVfpExt.mof

Microsoft has provided a dedicated script to help organizations with large-scale deployments on the SCVMM Management Server. Moreover, there is also a post-installation script that can be used with patching tools. IT admins can download both scripts from this support page.

Read the original here:

Microsoft to Fix New Bug Breaking Hyper-V VMs in Windows Server - Petri.com

Categories
Dedicated Server

Lost in the cloud? Dedicated servers as a real alternative – DatacenterDynamics

Lost in the cloud? Dedicated servers as a real alternative  DatacenterDynamics

View post:

Lost in the cloud? Dedicated servers as a real alternative - DatacenterDynamics

Categories
Dedicated Server

Edgecore Networks Introduces the CSP-7550 Server-switch Solution for Network Visibility Monitoring, Virtualized Security, and Mobile LTE/5G Gateway…

Driving new open networking solutions and enhanced service experiences across high-performance compute and multi-cloud landscapes

HSINCHU, Taiwan, December 13, 2022--(BUSINESS WIRE)--Edgecore Networks, the leader in open networking solutions, today announces the hyper-cloud appliance solution for high-performance network visibility monitoring, hardware-enhanced virtualized security, and mobile LTE/5G gateway applications. Fueled by the Intel Tofino Expandable Architecture, the CSP-7550 is a server-switch based on Intel Xeon Scalable processors with built-in AI accelerators. The switch system includes 32 x 100 GbE network ports based on a P4 programmable Intel Tofino Intelligent Fabric Processor (IFP) and optimized for the Intel Xeon Scalable platform increasing CPU capacity and performance for virtual machine consolidation and density, as well as boosting memory bandwidth.

As a network solution provider, Edgecore understands the requirements of modern network deployments and is dedicated to delivering new levels of service and breakthrough performance for operators, unlocking the potential of open networking and releasing a new service experience across mobile and multi-cloud landscapes. The CSP-7550 is a powerful platform optimized for the Intel Tofino Expandable Architecture to deliver large and fast table lookups, high-performance computing, and predictable forwarding times. The CSP-7550 gives cloud service providers the scalability to handle increasing traffic loads and demanding computing requirements.

The CSP-7550 includes eight DDR4 DIMM slots per CPU, with local storage options including two SATA III or PCIe. It supports four open PCIe slots for customers to choose whatever kind of standard FPGA, Smart NIC, or AI/ML PCIe cards etc. for different applications. In addition, the CSP-7550 supports an optional FPGA card, which has a high-speed connection to the Tofino chipset. With the FPGA card, the CSP-7550 is able to support extra-large tables for hundreds of millions of session entries or provide tens of GBs of high-speed buffering for Hierarchical Quality of Service (HQoS).

The CSP-7550 is a truly open platform, operators have the flexibility to install an operating system and application software that precisely suits their needs or build their own customized device that represents a solid future-proof investment. The CSP-7550 also supports Enterprise SONiC Distribution by Edgecore, with various applications and features that can be easily added and integrated based on a customers needs.

With its server-grade computing and hardware-enhanced security capabilities, the CSP-7550 is an ideal solution as a Server Load balancer (SLB), Network Packet Broker (NPB), Broadband Network Gateway (BNG), or 5G User Plane Function (UPF). The new server-switch solution delivers high-performance and flexibility in cloud data centers and at the edge, enhancing computing, switching, and storage applications to meet the demands of modern network deployments.

Nanda Ravindran, Vice President of Product Management of Edgecore, said, "Edgecore's new hyper cloud appliance delivers the industrys leading turnkey solution for the most demanding of network environments. Network operators are starting to embrace open network solutions and requiring more powerful platforms for high-performance computing. CSP-7550 Server-switch with enhanced CPU capacity and performance enables value-added application development to address continuously expanding network requirements. Edgecore offers greater choice and flexibility for network operators to build modern networking infrastructures for the multi-cloud and mobile-centric world."

"As the industry is gearing towards programmable infrastructure, we are pleased to offer multi-terabit performance with Intel Tofino Expandable Architecture optimized for customers evolving edge-to-cloud requirements, such as load balancing, security, telco user plane functions and broadband gateways," said Barry Davis, General Manager of Marketing and Software Planning at Intel. "Based on P4 Tofino Expandable Architecture, which combines fully programmable Intel Tofino Intelligent Fabric Processors (IFPs) with Intel Xeon Scalable CPUs and accelerators such as Intel Stratix 10 MX FPGA cards, our integrated solution will fulfill many different deployment requirements ranging from medium businesses to carrier-level service providers."

About Edgecore Networks

Edgecore Networks Corporation is a wholly owned subsidiary of Accton Technology Corporation, the leading network ODM. Edgecore Networks delivers wired and wireless networking products and solutions through channel partners and system integrators worldwide for data center, service provider, enterprise, and SMB customers. Edgecore Networks is the leader in open networking, providing a full line of open 1G-400G Ethernet switches, core routers, cell site gateways, virtual PON OLTs, packet transponders, and Wi-Fi access points that offer a choice of commercial and open source NOS and SDN software. For more information, visit http://www.edge-core.com.

All trademarks, service marks, registered marks, or registered service marks are the property of their respective owners.

2022 Edgecore Networks. The information contained herein is subject to change without notice. Edgecore Networks shall not be liable for technical or editorial errors or omissions contained herein.

Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.

View source version on businesswire.com: https://www.businesswire.com/news/home/20221213005098/en/

Contacts

Lucille Lulucille_lu@edge-core.com +886-3-505-3674

More:

Edgecore Networks Introduces the CSP-7550 Server-switch Solution for Network Visibility Monitoring, Virtualized Security, and Mobile LTE/5G Gateway...

Categories
Dedicated Server

Follow the ping : Frisco Gaming – Red Bull

Follow the ping : Frisco Gaming  Red Bull

Read more here:

Follow the ping : Frisco Gaming - Red Bull

Categories
Dedicated Server

Navy Pier to host party to celebrate New Year’s – The Beverly Review

Navy Pier will host the party of the year on the biggest night of the year in the opulent and historic Aon Grand Ballroom.

New Year on the Pier features premium catering and bar, dancing and live band and DJ entertainment, ending with a festive midnight countdown followed by a fireworks show at midnight. Doors open at 8 p.m., and the party concludes at 1 a.m.

Matt Kysia from Kysia Live returns as the master of ceremonies. Entertainment includes The Lakeshore Encores, performing a variety of pop, Motown and funk; Supersonic trio Treble Squad, consisting of a violinist, saxophonist and drummer performing electronic music; and Kice, a DJ and producer based out of Chicago.

The general admission Celebration Package includes premium spirits, craft and domestic beers, house wines, champagne, gourmet appetizers, party favors for the duration of the event, and photo opportunities galore.

VIP admission also includes access to the VIP-only balcony, exclusive rooftop access to view the fireworks, private food stations, ultra-premium bar, party favors and express entry.

A limited number of VIP Lounge Table Packages will be made available. The VIP Lounge Table Package includes 12 VIP tickets with lounge seating, skybox view of the stage and dance floor, dedicated server with table-side appetizer trays, beer and cocktail table service, and premium champagne.

For more information or tickets, visit the website at navypier.org.

Follow this link:

Navy Pier to host party to celebrate New Year's - The Beverly Review

Categories
Dedicated Server

What AIIMS server hijack tells us about cyber security: Every database is vulnerable, and our defences a – Times of India

Mishi Choudhary and Faisal Farooqui

For days, hundreds of dedicated healthcare professionals at Delhis prestigious AIIMS had to work with pen and paper to register a sea of patients waiting in long queues after a ransomware attack. What should have been a seamless task of admitting patients in the hospital or rendering check-ups and diagnostic services in the outpatient department had to be done as it was in the 1970s and 80s.

This is because on November 23 the core or main servers of AIIMS were hijacked (or held hostage) by an unknown, faceless enemy who could have been operating as a single individual or a group or organisation. The servers were partially restored on December 6 and online appointments were restored earlier this week.

Read full opinion on TOI+

Views expressed above are the author's own.

END OF ARTICLE

Continue reading here:

What AIIMS server hijack tells us about cyber security: Every database is vulnerable, and our defences a - Times of India

Categories
Dedicated Server

Xnspy stalkerware spied on thousands of iPhones and Android devices – TechCrunch

A little-known phone monitoring app called Xnspy has stolen data from tens of thousands of iPhones and Android devices, the majority whose owners are unaware that their data has been compromised.

Xnspy is one of many so-called stalkerware apps sold under the guise of allowing a parent to monitor their childs activities, but are explicitly marketed for spying on a spouse or domestic partners devices without their permission. Its website boasts, to catch a cheating spouse, you need Xnspy on your side, and, Xnspy makes reporting and data extraction simple for you.

Stalkerware apps, also known as spouseware, are surreptitiously planted by someone with physical access to a persons phone, bypassing the on-device security protections, and are designed to stay hidden from home screens, which makes them difficult to detect. Once installed, these apps will silently and continually upload the contents of a persons phone, including their call records, text messages, photos, browsing history and precise location data, allowing the person who planted the app near-complete access to their victims data.

But new findings show many stalkerware apps are riddled with security flaws and are exposing the data stolen from victims phones. Xnspy is no different.

Security researchers Vangelis Stykas and Felipe Solferini spent months decompiling several known stalkerware apps and analyzing the edges of the networks that the apps send data to. Their research, presented at BSides London this month, identified common and easy to find security flaws in several stalkerware families, including Xnspy, such as credentials and private keys left behind in the code by the developers and broken or nonexistent encryption. In some cases the flaws are exposing the victims stolen data, now sitting on someone elses insecure servers.

During their research, Stykas and Solferini discovered clues and artifacts that identified the individuals behind each operation, but they declined to share details of the vulnerabilities with the stalkerware operators or publicly disclose details about the flaws for fear that doing so would benefit malicious hackers and further harm victims. Stykas and Solferini said that all of the flaws they found are easy to exploit and have likely existed for years.

Others have waded into murkier legal waters by exploiting those easy-to-find vulnerabilities with the apparent aim of exposing stalkerware operations as a form of vigilantism. A huge cache of internal data taken from the servers of TheTruthSpy stalkerware and its affiliate apps and given to TechCrunch earlier this year allowed us to notify thousands of victims whose devices were compromised.

Since our investigation into TheTruthSpy, TechCrunch has obtained further caches of stalkerware data, including from Xnspy, exposing their operations and the individuals who profit from the surveillance.

Xnspy advertises its phone monitoring app for spying on a persons spouse or domestic partner. Image Credits: TechCrunch (screenshot)

Data seen by TechCrunch shows Xnspy has at least 60,000 victims dating back to 2014, including thousands of newer compromises recorded as recently as 2022. The majority of victims are Android owners, but Xnspy also has data taken from thousands of iPhones.

Many stalkerware apps are built for Android since it is easier to plant a malicious app than on an iPhone, which have tighter restrictions on which apps can be installed and what data can be accessed. Instead of planting a malicious app, stalkerware for iPhones tap into a devices backup stored in Apples cloud storage service iCloud.

With a victims iCloud credentials, the stalkerware continually downloads the devices most recent iCloud backup directly from Apples servers without the owners knowledge. ICloud backups contain the majority of a persons device data, allowing the stalkerware to steal their messages, photos and other information. Enabling two-factor authentication makes it far more difficult for malicious individuals to compromise a persons online account.

The data we have seen contains more than 10,000 unique iCloud email addresses and passwords used for accessing a victims cloud-stored data, though many of the iCloud accounts are connected to more than one device. Of that number, the data contains more than 6,600 authentication tokens, which had been actively used to exfiltrate victims device data from Apples cloud, though many had expired. Given the possibility of ongoing risk to victims, TechCrunch provided the list of compromised iCloud credentials to Apple before publication.

The Xnspy data we obtained was unencrypted. It also included information that further unmasked Xnspys developers.

Konext is a small development startup in Lahore, Pakistan, manned by a dozen employees, according to its LinkedIn page. The startups website says the startup specializes in bespoke software for businesses that seek all-in-one solutions, and claims to have built dozens of mobile apps and games.

What Konext doesnt advertise is that it develops and maintains the Xnspy stalkerware.

The data seen by TechCrunch included a list of names, email addresses and scrambled passwords registered exclusively to Konext developers and employees for accessing internal Xnspy systems.

The cache also includes Xnspy credentials for a third-party payments provider that are tied to the email address of Konexts lead systems architect, according to his LinkedIn, and who is believed to be the principal developer behind the spyware operation. Other Konext developers used credit cards registered to their own home addresses in Lahore for testing the payment systems used for Xnspy and TrackMyFone, an Xnspy clone also developed by Konext.

Some of Konexts employees are located in Cyprus, the data shows.

Konext, like other stalkerware developers, makes a concerted effort to conceal its activities and keep the identities of its developers from public view, likely to shield from the legal and reputational risks that come with facilitating covert surveillance on a massive scale. But coding mistakes left behind by Konexts own developers further link its involvement in developing stalkerware.

TechCrunch found that Konexts website is hosted on the same dedicated server as the website for TrackMyFone, as well as Serfolet, a Cyprus-based entity with a conspicuously barebones website, which Xnspy says processes refunds on behalf of its customers. No other websites are hosted on the server.

TechCrunch contacted Konexts lead systems architect by email for comment, both to his Konext and Xnspy email addresses. Instead, a person named Sal, whose Konext email address was also in the data but declined to provide their full name, responded to our email. Sal did not dispute or deny the companys links to Xnspy in a series of emails with TechCrunch, but declined to comment. When asked about the number of compromised devices, Sal appeared to confirm his companys involvement, saying in one email that the figures you quoted dont match with what we have. When asked for clarity, Sal did not elaborate.

Xnspy is the latest in a long list of flawed stalkerware apps: mSpy, Mobistealth, Flexispy, Family Orbit, KidsGuard and TheTruthSpy have all exposed or compromised their victims data in recent years.

If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The Coalition Against Stalkerware also has resources if you think your phone has been compromised by spyware. You can contact this reporter on Signal and WhatsApp at +1 646-755-8849 or zack.whittaker@techcrunch.com by email.

Read more:

Read more:

Xnspy stalkerware spied on thousands of iPhones and Android devices - TechCrunch

Categories
Dedicated Server

UTXO Technologies, Inc., Wholly Owned Subsidiary of IDGlobal … – StreetInsider.com

Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.

DOWNERS GROVE, IL / ACCESSWIRE / December 15, 2022 / IDGlobal Corp. (OTC PINK:IDGC) - is pleased to announce acquiring a 4000 sq. ft. specialized facility, thus extending the Company's service range with ultimate Cybersecurity as a Service (CaaS) and Virtual Power Plant platform solutions, through the Utmost Tech Research & Development Center, Ltd., based in Poland. Utmost Tech through UTXO is on a mission to scale up its' existing data center infrastructure and upgrade the computing power with the latest technology from Nvidia - the Grace Hopper H100 GPU architecture.

High Performance Computing - to answer rapidly growing demand for big data processing and artificial intelligence apps the IT world is migrating from CPU-based data center architecture into the GPU architecture with distributed microservices that provides computing power outperforming by 20x the old CPU-based datacenters.

UTXO is specialized in manufacturing and servicing of multiple electronics devices, including industrial computers and High-Performance Computing servers, dedicated for data centers and AI factories. The Company has established procurement process of electronics components from partners that include Nvidia and Intel as well as many distributors world-wide. The basic building block of the UTXO's AI Factory Data Center is the AI Wall which consists of 20 UT-8xGPU (or 20x UT-4xGPU) servers installed in 5 racks, 4 servers per rack. Additional rack for switches is installed in the middle to assure proper, same length cable distribution. This size optimizes both performance and cost while still minimizing system bottlenecks so that complex workloads are well supported. "A single AI Wall is capable of 48 AI PFLOPS. The UTXO AI Factory consists of 4 AI Walls connected via two layer switching system, providing 192 Peta FLOPS across 80 servers, states Marcin Michel, CEO of UTXO Technologies, Inc."

"The Company is elated on the progress we have made over the last quarter of the year, and we will be providing a lot more details on the various products, forecasts and projections, as well as lending more insight as to the future of IDGC, states interim CEO, Sebastien Dufort."

ABOUT UTXO TECHNOLOGIES, INC. (WWW.UTMOSTTECH.COM)

UTXO is a multi-disciplinary hi-tech organization consisting of several teams experienced in advanced IT solutions, electronics, software and hardware development, as well as nano material science. The teams are dedicated disruptive innovators in the energy sector, highly focused within the world of distributed renewable energy solutions. The teams work together under DevOps principles providing to UTXO Clients advanced IT services & Machine Learning Operations that run on modern High Power Computing distributed GPU server infrastructure, owned and operated by UTXO.

IDGC's Plan of Operations.

IDGC is an emerging growth company under the JOBS Act of 2012 and, as a diversified holding company, will focus on emerging and middle-market international investment opportunities through its subsidiaries. IDGlobal Corp. is an organization engaged in the business of fostering early-stage companies through the different developmental phases until the companies have sufficient financial, human, and physical resources to function on their own.

Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995: The statements contained herein are forward-looking statements that are subject to risks and uncertainties that could cause actual results to differ materially from those expressed in the forward-looking statements, including, but not limited to, certain delays beyond the Company's control with respect to market acceptance of new technologies or products, delays in testing and evaluation of products, and other risks detailed from time to time in the Company's filings with the Securities and Exchange Commission. Please read the full disclaimer at http://www.idglobalcorp.io.

Contact: [emailprotected] for more information

SOURCE: ID Global Corporation

View source version on accesswire.com: https://www.accesswire.com/731965/UTXO-Technologies-Inc-Wholly-Owned-Subsidiary-of-IDGlobal-Corp-Is-Pleased-to-Announce-a-Real-Estate-Investment-Transaction-to-Open-the-Companys-First-AI-Factory

See original here:

UTXO Technologies, Inc., Wholly Owned Subsidiary of IDGlobal ... - StreetInsider.com

Categories
Dedicated Server

How Musk may reinvent the internet without even trying – The Hill

Billionaire entrepreneur and innovator Elon Musk might have just opened a new chapter in the history of the internet albeit unintentionally. Hisnew Twitter policiesand thedigital refugees he created, most fleeing to the heretofore obscureTwitter-like platform Mastodon, could give birth to a very new type of social media experience.

Upon buying Twitter, Musk,a self-described free speech absolutist, reinstated accounts belonging to formerPresident Donald Trump, the right-wing satire siteBabylon Beeand the occasionally crude left-wing comedianKathy Griffin.This was coupled with removing verification requirements (that have since been updated) while adding a monthly fee, as well as mass layoff at the company.

More recently,Twitter has suspended several journalistswho reported on information about Musks jet.

Disgruntled with the changes and controversy, some users stampeded to other services, such as the far smaller European Twitter alternative Mastodon, the brainchild of free-speech advocate and German software engineerEugen Rochko. But can Mastodon compete with Twitters reach? AlthoughMastodons 1 million userspale in comparison toTwitters 238 million users, Mastodons secret weapon is that its more than a mere site. It is a federation of sites that can maintain their autonomy while exchanging information with each other. Mastodon uses an open and freesocial media protocol, ActivityPub,which allows any social medium to connect to any other, as long as they are open and transparent with each other. Several platforms, such as the YouTube-likePeerTube, Instagram alternativePixelfed, social networkingFriendicaalready do it.The shift from Twitter to Mastodon and ActivityPub could be an epoch-making digital revolution, comparable with the invention of the web itself. ActivityPub may restore the web and its most sophisticated layer, social media, to the open and universally connectable vision of the internet itself. Our most popular social media platforms Facebook, Twitter and TikTok remain walled gardens, only allowing the users to exchange information within apps under the same ownership or create apps within each platform. This drawback does not apply to ActivityPub-empowered sites. Far from walled gardens, they are fields connected by open roads.

What is ActivityPub and how does it work? At the simplest level, it is a method (protocol) for social media servers to talk to each other even if they are owned by different entities and dedicated to different purposes. Imagine that CBS News, BBC, National Review and Fox News create their own social media servers using the Mastodon user interface and ActivityPub as a server-to-server protocol. All that the owners of these sites must do to connect to each other is to list the server addresses of each other on a list of federated sites.

Immediately, the users of the sites that talk to each other will be able to follow other users reposts or comments across server boundaries. This has several advantages. The first and most important is that social media owners have a direct and immediate relationship with their users. The owners do not need to be corporate, by the way. Independent media organizations, nonprofits or user co-ops can create their own media servers. They can develop their content policies, privacy protection methods and financial support methods, from advertising (which they control) to subscription or donation-based support. Social media owners can also decide when and how to open access to other federation members. This may includetrial periods or suspension of communication.

Finally, any company or nonprofit organization can use a social media interface of their own, not Mastodon, and still be able to talk to other sites using ActivityPub. The interface can include new tools, such as a Trust button to replace the like or favorite buttons. My colleagues and I created the TrustFirst social media server powered by ActivityPub and Mastodon. On it, machine learning analyzes the content you are about to reshare or like and advises you whether the content is trustworthy. A new button invites you to trust or not and the trust value is used in disseminating the content more or less.

More intriguingly, Musk could also implement ActivityPub on Twitter, asTumblr did. He would ensure the sites long-term reach while Twitter users will have the cake (be on Twitter) and eat it too (not be beholden to its rules).

The genius of the internet is that it allowed and should allow independently owned and managed sites to talk to each other. This is reflected in the very name of the internet, which is a network of networks (inter-net), not one integrated network. The closed social media detour in the history of communication might just come to a very interesting swerve. Watch out for tight turns!

Sorin Matei, Ph.D., is the College of Liberal Arts associate dean of research and graduate education and a professor of communication at Purdue University, where he studies the relationship between information technology, group behavior and social structures in a variety of contexts. He is a senior research fellow at the Krach Institute for Tech Diplomacy at Purdue.

View original post here:

How Musk may reinvent the internet without even trying - The Hill