24:
103:
and the reach and depth of
Knowledge many − from governments to special interest groups and corporations − have an issue with Knowledge opening up neutral knowledge and information that they'd like to suppress to the public. And hence we should make sure to protect all forms of potential threats and
119:
and other web-services often directly display or otherwise present data that they fetch from
Knowledge which may lead to some users not visiting the Knowledge page (where they might discover other information that goes beyond what they originally looked for but is of interest to them) which may or
123:
Proposed countermeasures or solutions: Google and other sites could display a visible button "read the full
Knowledge page" or alike next to that data so that at least if one would be interested in some more info one could easily and quickly get to the appropriate article (as of right now Google
124:
seems to do this for the most part), other tools and services that for instance read snippets of
Knowledge articles could have commands built in to somehow open the Knowledge page on their display or some linked device or 'tell me more' for reading the entire page (or its table of contents),
326:
Proposed countermeasures or solutions: linking voters to their arguments and linking these to counterarguments and having internal decision makers pay closer attention to such argumentation-chains, identifying canvassing &
83:
No matter how small the chances are that any other method than government censorship will be used against
Knowledge it's worth time and efforts to also take other methods into consideration and protect against these
147:
Proposed countermeasures or solutions: identify them and see what they're making different and why people like to use them and discuss potential changes or extensions
581:
488:
Makes sure that a reestablishment of the site would also work out in practice and publishes information on how to do so if any such isn't yet available
485:
Makes sure that its database downloads are complete and could potentially be used to reestablish the site without any missing data (such as metadata)
75:
Multiple potential threats to
Knowledge's survival, accessibility, reach, overall quality and span of content and persistence have been identified.
556:
349:
Proposed countermeasures or solutions: political engagement, improving anonymous / censorship-resistant access-methods (such as creating a
39:
It contains the advice or opinions of one or more
Knowledge contributors. This page is not an encyclopedia article, nor is it one of
236:
125:
235:
Proposed countermeasures or solutions: improve anonymous access-methods, a registration group/page for such incidents (see also
427:
304:
268:
Quality decline (e.g. by online marketing, paid editing, Internet trolls, widespread use of bad journalistic research in
188:
569:
497:
Continues awareness campaigns about what
Knowledge is and responds to criticism from both internal and external sources
339:
252:
602:
494:
Continues its fight against current and potential censorship and researches new existing, effective ways for doing so
471:
Considering the current state of threats and countermeasures it is proposed that for an adequate response
Knowledge:
40:
394:
Proposed countermeasures or solutions: allocating more resources towards the improvement of cybersecurity, improved
107:
However the availability of
Knowledge as a free, full download makes it near impossible to fully destroy the site.
248:
303:
Laws and similar measures that damage Knowledge and/or make it significantly harder to maintain it (See also:
403:
44:
200:
Censorship within Knowledge by ill-intentioned administrators or via direct or indirect government control
511:
476:
244:
371:, actively distributing Knowledge, categorically declining any requests made via censorship-blackmailing
319:
Debates getting undermined via non- or semi-substantial arguments and sheer number of voters (See also:
411:
240:
597:
443:
422:
Proposed countermeasures or solutions: Backup finances, decreasing financial running costs (e.g. via
308:
466:
423:
410:, calls for more relevant developers (e.g. by a targeted banner for users who read an article in
350:
224:
Targeted attacks against individual or groups of Knowledge editors (such as harassment, hacking,
104:
improve Knowledge's resilience besides fighting current censorship of Knowledge mainly by China.
458:
439:
62:
521:
516:
551:
536:
168:
Increased usage of potential or current search engines that disadvantage Knowledge results
8:
500:
Makes effective attempts to recruit more security developers to improve its cybersecurity
292:
100:
92:
399:
225:
54:
541:
531:
157:
47:. Some essays represent widespread norms; others only represent minority viewpoints.
32:
575:
526:
383:
343:
96:
78:
447:
395:
342:(may come with demands of changes to Knowledge / Knowledge content) (See also:
288:
176:
Non-governmental / non-nation-wide censorship of Knowledge (e.g. by companies)
591:
320:
546:
479:(e.g. by raising awareness about them), including making them available as
284:
269:
110:
491:
Monitors the search algorithms of major search engines − not just Google
480:
184:
Discreditation campaigns and deterioration of Knowledge's public image
563:
391:
Targeted hacking attacks against Knowledge's technical infrastructure
333:
229:
243:), building ways to prove one's identity if it was stolen (see also
407:
314:
Proposed countermeasures or solutions: lobbying, Knowledge-blackout
280:
153:
368:
360:
353:
116:
216:
Policies becoming inflexible or not adapting to new realities
263:
Proposed countermeasures or solutions: more decentralization,
141:
582:
China taking on Knowledge with its own online encyclopaedia
376:
504:
576:
Turkish authorities block Knowledge without giving reason
457:
Proposed countermeasures or solutions: frequent backups,
438:
Proposed countermeasures or solutions: frequent backups,
364:
357:
260:
Targeted manipulation of Knowledge editors and admins
208:
Incompetence of the WMF (e.g. causing overspending)
382:Proposed countermeasures or solutions: (See also:
156:) that disadvantage Knowledge results (See also:
140:Competitor encyclopedias and services (see also:
589:
570:Russia plans alternative version of 'Knowledge'
557:Knowledge:Imminent death of Knowledge predicted
152:Changes to search engine algorithms (mainly
191:, establishing channels for the Knowledge
132:(Maliciously altered) forks of Knowledge
287:inserting malicious content (See also:
237:Knowledge:Responding to threats of harm
187:Proposed countermeasures or solutions:
126:Knowledge Engine (Wikimedia Foundation)
590:
305:User:Mrs. Jan Cola/EU copyright reform
298:Proposed countermeasures or solutions:
275:Proposed countermeasures or solutions:
219:Proposed countermeasures or solutions:
211:Proposed countermeasures or solutions:
203:Proposed countermeasures or solutions:
179:Proposed countermeasures or solutions:
171:Proposed countermeasures or solutions:
163:Proposed countermeasures or solutions:
135:Proposed countermeasures or solutions:
430:), (See also: #7 of indirect threats)
18:
406:hacking competitions, prioritizing
13:
340:Government censorship of Knowledge
45:thoroughly vetted by the community
41:Knowledge's policies or guidelines
14:
614:
189:m:Propagate the model, not issues
253:m:Help:Two-factor authentication
22:
272:, or hard-to-detect vandalism)
249:Knowledge:User account security
120:may not be considered an issue
1:
467:Proposed contemporary conduct
435:Willful physical destruction
475:Proactively distributes its
91:Considering the rise of the
7:
512:Knowledge:Database download
245:Template:Committed identity
10:
619:
412:Category:Computer security
241:Knowledge:No legal threats
52:
16:Essay on editing Knowledge
444:cooperative storage cloud
309:Knowledge:SOPA initiative
195:to respond to allegations
603:Knowledge warning essays
424:peer-to-peer web hosting
232:and account-takeovers)
459:distributed data store
440:distributed data store
522:Internet manipulation
43:, as it has not been
552:History of Knowledge
537:Security engineering
517:m:Internet-in-a-Box
428:decreasing salaries
400:bug bounty programs
293:Knowledge:Vandalism
228:, blackmailing and
101:information warfare
93:information society
79:Reasons for concern
477:database downloads
454:Natural disasters
226:social undermining
542:Threat assessment
532:Computer security
158:search neutrality
73:
72:
610:
598:Knowledge essays
111:Indirect threats
88:any such occur.
65:
26:
25:
19:
618:
617:
613:
612:
611:
609:
608:
607:
588:
587:
566:
561:
527:Internet outage
507:
469:
408:security-issues
384:DDoS mitigation
367:write access),
344:Help:Censorship
336:
113:
81:
69:
68:
61:
57:
49:
48:
23:
17:
12:
11:
5:
616:
606:
605:
600:
586:
585:
579:
573:
565:
564:External links
562:
560:
559:
554:
549:
544:
539:
534:
529:
524:
519:
514:
508:
506:
503:
502:
501:
498:
495:
492:
489:
486:
483:
468:
465:
464:
463:
462:
461:
452:
451:
450:
448:access control
433:
432:
431:
417:
416:
415:
396:access control
389:
388:
387:
374:
373:
372:
335:
334:Direct threats
332:
331:
330:
329:
328:
317:
316:
315:
301:
300:
299:
289:Knowledge:Spam
278:
277:
276:
266:
265:
264:
258:
257:
256:
222:
221:
220:
214:
213:
212:
206:
205:
204:
198:
197:
196:
182:
181:
180:
174:
173:
172:
166:
165:
164:
150:
149:
148:
138:
137:
136:
130:
129:
128:
112:
109:
80:
77:
71:
70:
67:
66:
63:WP:WIKITHREATS
58:
53:
50:
38:
37:
29:
27:
15:
9:
6:
4:
3:
2:
615:
604:
601:
599:
596:
595:
593:
583:
580:
577:
574:
571:
568:
567:
558:
555:
553:
550:
548:
545:
543:
540:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
509:
499:
496:
493:
490:
487:
484:
482:
478:
474:
473:
472:
460:
456:
455:
453:
449:
445:
441:
437:
436:
434:
429:
425:
421:
420:
418:
413:
409:
405:
401:
397:
393:
392:
390:
385:
381:
380:
378:
375:
370:
366:
363:and allowing
362:
359:
355:
352:
348:
347:
345:
341:
338:
337:
325:
324:
322:
318:
313:
312:
310:
306:
302:
297:
296:
294:
290:
286:
285:Internet bots
282:
279:
274:
273:
271:
267:
262:
261:
259:
254:
250:
246:
242:
238:
234:
233:
231:
227:
223:
218:
217:
215:
210:
209:
207:
202:
201:
199:
194:
190:
186:
185:
183:
178:
177:
175:
170:
169:
167:
162:
161:
159:
155:
151:
146:
145:
143:
139:
134:
133:
131:
127:
122:
121:
118:
115:
114:
108:
105:
102:
98:
94:
89:
87:
76:
64:
60:
59:
56:
51:
46:
42:
36:
34:
28:
21:
20:
547:Threat model
470:
356:-site or an
327:manipulators
192:
106:
90:
85:
82:
74:
30:
446:, improved
31:This is an
592:Categories
419:Finances
404:white hat
230:kompromat
193:community
505:See also
481:torrents
379:attacks
281:Spamming
154:PageRank
55:Shortcut
369:meshnet
361:eepsite
584:, 2017
578:, 2017
572:, 2014
354:.onion
321:WP:DEM
291:&
239:&
117:Google
86:before
270:WP:RS
142:Quora
33:essay
402:and
377:DDoS
283:and
426:or
365:VPN
358:I2P
351:Tor
97:Age
594::
442:,
398:,
346:)
323:)
311:)
307:,
295:)
251:,
247:,
160:)
144:)
99:,
414:)
386:)
255:)
95:/
35:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.