Fediverse Logo Proposal
   HOME



picture info

Fediverse Logo Proposal
The Fediverse (commonly shortened to fedi) is a collection of social networking services that can communicate with each other (formally known as federation) using a common protocol. Users of different websites can send and receive status updates, multimedia files and other data across the network. The term ''Fediverse'' is a portmanteau of ''federation'' and ''universe''. The majority of Fediverse platforms are based on free and open-source software, and create connections between servers using the ActivityPub protocol. Some software still supports older federation protocols as well, such as OStatus, the Diaspora protocol and Zot. Diaspora* is the only actively developed software project classified under the original definition of ''Fediverse'' that does not support ActivityPub. Design While a traditional social networking service will host all its content on servers managed by the owner of the website, the decentralized structure of the Fediverse allows any individual or organiza ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Mastodon (social Network)
Mastodon is a free and open-source software platform for decentralized social networking with microblogging features similar to Twitter. It operates as a federated network of independently managed servers that communicate using the ActivityPub protocol, allowing users to interact across different instances within the Fediverse. Each Mastodon instance establishes its own moderation policies and content guidelines, distinguishing it from centrally controlled social media platforms. First released in 2016 by Eugen Rochko, Mastodon has positioned itself as an alternative to mainstream social media, particularly for users seeking decentralized, community-driven spaces. The platform has experienced multiple surges in adoption, most notably following the Twitter acquisition by Elon Musk in 2022, as users sought alternatives to Twitter. It is part of a broader shift toward decentralized social networks, including Bluesky and Lemmy. Mastodon emphasizes user privacy and moderation ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Communications Decency Act
The Communications Decency Act of 1996 (CDA) was the United States Congress's first notable attempt to regulate pornographic material on the Internet. In the 1997 landmark case '' Reno v. ACLU'', the United States Supreme Court unanimously struck the act's anti-indecency provisions. The Act is the short name of Title V of the Telecommunications Act of 1996, as specified in Section 501 of the 1996 Act. Senators James Exon and Slade Gorton introduced it to the Senate Committee of Commerce, Science, and Transportation in 1995. The amendment that became the CDA was added to the Telecommunications Act in the Senate by an 81–18 vote on June 15, 1995. As eventually passed by Congress, Title V affected the Internet (and online communications) in two significant ways. First, it attempted to regulate both indecency (when available to children) and obscenity in cyberspace. Second, Section 230 of title 47 of the U.S. Code, part of a codification of the Communications Act of 1934 (S ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


PhotoDNA
PhotoDNA is a proprietary image-identification and content filtering technology widely used by online service providers. History PhotoDNA was developed by Microsoft Research and Hany Farid, professor at Dartmouth College, beginning in 2009. From a database of known images and video files, it creates unique hashes to represent each image, which can then be used to identify other instances of those images. The hashing method initially relied on converting images into a black-and-white format, dividing them into squares, and quantifying the shading of the squares, did not employ facial recognition technology, nor could it identify a person or object in the image. The method sought to be resistant to alterations in the image, including resizing and minor color alterations. Since 2015, similar methods are used for individual video frames in video files. Microsoft donated the PhotoDNA technology to Project VIC, managed and supported by the International Centre for Missing & Exploi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Section 230
In the United States, Section 230 is a section of the Communications Act of 1934 that was enacted as part of the Communications Decency Act of 1996, which is Title V of the Telecommunications Act of 1996, and generally provides immunity for online computer services with respect to third-party content generated by its users. At its core, Section 230(c)(1) provides immunity from liability for providers and users of an "interactive computer service" who publish information provided by third-party users: Section 230(c)(2) further provides "Good Samaritan" protection from civil liability for operators of interactive computer services in the voluntary good faith removal or moderation of third-party material the operator "considers to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected." Section 230 was developed in response to a pair of lawsuits against online discussion platfo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Center For Missing And Exploited Children
The National Center for Missing & Exploited Children (NCMEC) is a private, nonprofit organization established in 1984 by the United States Congress. In September 2013, the United States House of Representatives, United States Senate, and the President of the United States reauthorized the allocation of $40 million in funding for the organization as part of Missing Children's Assistance Reauthorization Act of 2013. The current chair of the organization is Jon Grosso of Kohl's. NCMEC handles cases of missing minors from infancy to young adults through age 20. Operations Primarily funded by the United States Department of Justice, the NCMEC acts as an information clearinghouse and resource for parents, children, law enforcement agencies, schools, and communities to assist in locating missing children and to raise public awareness about ways to prevent child abduction, and child sexual abuse. John Walsh, Noreen Gosch (mother of Johnny Gosch, who went missing in 1982), and others ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Child Grooming
Sexual grooming is the action or behavior used to establish an emotional connection with a vulnerable person – generally a minor under the age of consent – and sometimes the victim's family, to lower their inhibitions with the objective of sexual abuse. It can occur in various settings, including online, in person, and through other means of communication. Children who are groomed may experience mental health issues, including "anxiety, depression, post-traumatic stress, and suicidal thoughts". History and recognition Origins Before the term "grooming" was associated with grooming a child for sexual abuse, it had come to have a meaning of mentorship, coaching, or preparing someone for leadership. From 1975 to 1985, law enforcement in the United States became increasingly aware of child sexual abuse that happened to children from outside their family, committed by those who were not strangers. Previously, the focus of law enforcement had been on "stranger danger" and those ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Child Sexual Exploitation
Commercial Sexual Exploitation of Children (CSEC) defines the "umbrella" of crimes and activities that involve inflicting sexual abuse on to a child as a financial or personal opportunity. Commercial Sexual Exploitation consists of forcing a child into prostitution, sex trafficking, early marriage, child sex tourism and any other venture of exploiting children into sexual activities. According to the Office oJuvenile Justice and Delinquency Prevention the lack of reporting the crime and "the difficulties associated with identifying and measuring victims and perpetrators" has made it almost impossible to create a national estimate of the prevalence of Commercial Sexual Exploitation of Children in the United States. There is an estimated one million children that are exploited for commercial sex globally; of the one million children that are exploited, the majority are girls. CSEC in the United States According to the Office of the Assistant Secretary for Planning and Evaluation ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Child Sexual Abuse Material
Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is erotic material that depicts persons under the designated age of majority. The precise characteristics of what constitutes child pornography varies by criminal jurisdiction. Child pornography is often produced through online solicitation, coercion and covert photographing. In some cases, sexual abuse (such as forcible rape) is involved during production. Pornographic pictures of minors are also often produced by children and teenagers themselves without the involvement of an adult. Images and videos are collected and shared by online sex offenders. Laws regarding child pornography generally include sexual images involving prepubescents, pubescent, or post-pubescent minors and computer-generated images that appear to involve them. Most possessors of child p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Stanford Internet Observatory
The Stanford Internet Observatory (SIO) was a multidisciplinary program for the study of abuse in information technologies, with a focus on social media, established in 2019. It is part of the Stanford Cyber Policy Center, a joint initiative of the Freeman Spogli Institute for International Studies and Stanford Law School. The program ended in 2024. History Alex Stamos founded the Stanford Internet Observatory in 2019, after leaving Facebook the year before over frustrations that he was not allowed to publish the full account of Russia's influence operations on the platform in the 2016 US Presidential elections. Projects and reports According to Lauren Coffey of Inside Higher Ed, by 2024 the Stanford Internet Observatory had "published 15 white paper reports, 10 journal articles and garnered more than 5,000 media mentions". The SIO was the first to out Russian support for Trump online in 2016, raised China spying concerns around the Clubhouse app in a 2021 report, partne ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Child Safety
Child protection (also called child welfare) is the safeguarding of children from violence, exploitation, abuse, abandonment, and neglect. It involves identifying signs of potential harm. This includes responding to allegations or suspicions of abuse, providing support and services to protect children, and holding those who have harmed them accountable. The primary goal of child protection is to ensure that all children are safe and free from harm or danger. Child protection also works to prevent future harm by creating policies and systems that identify and respond to risks before they lead to harm. In order to achieve these goals, research suggests that child protection services should be provided in a holistic way. This means taking into account the social, economic, cultural, psychological, and environmental factors that can contribute to the risk of harm for individual children and their families. Collaboration across sectors and disciplines to create a comprehensive s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Trust And Safety
Trust and Safety (T&S) is a term commonly used in the context of online platforms, communities, and services. It refers to the policies, practices, products and teams dedicated to ensuring that users can trust and feel safe while using a service or participating in an online community. Trust plays a key role in the daily encounters with the internet, primarily because individuals and customers heavily depend on online technologies for their communicative and commercial engagements. One of the core objectives of trust and safety is to ensure that a web portal or digital platform is a trusted, safe environment, where personal identity, data and virtual assets are protected.   T&S helps achieve this by enforcing various measures and tools, such as policies and guidelines for what is an acceptable code of conduct/behaviour, monitoring data breaches and malicious or harmful activities, and by addressing incidents and cybercrimes quickly. By investing in the trust and safety of d ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]