Reflection from Day 2 Protocol (Homework- 9/28/17)
- Blown to Bits (www.bitsbook.com), Chapter 3 Ghosts in the Machine, pp. 73-80 (What You See Is Not What the Computer Knows), then answer the following questions:
- Give an example of your own when just knowing what a computer did wasn’t sufficient - you really needed to know how and why it was doing what it was doing as well.
- Talk about file metadata and how it “fingerprints” a file. Include a discussion of file metadata benefits and challenges.
Reflection from Day 2 Protocol:
- An example of a computer’s work is not sufficient enough is when a computer cover parts of text that the user chooses to be hidden in front of other viewers. Even though it can hide the words, the document can be run through and bring up an exact copy with the words no longer covered.
- Metadata is a set of data that gives information about another type of data which can “fingerprint” a file. Metadata can support or refute a claim in any situation. The benefits of metadata is that it can back up another one’s story if their metadata checks everything out. However, the main challenge with metadata is that it can be forged to make it look like the information is correct. Many people need to be wary when the metadata looks suspicious. With metadata altered, this is considered as false evidence.
Comments
Post a Comment