Knowledge

:Threats to Knowledge - Knowledge

Source 📝

24: 103:
and the reach and depth of Knowledge many − from governments to special interest groups and corporations − have an issue with Knowledge opening up neutral knowledge and information that they'd like to suppress to the public. And hence we should make sure to protect all forms of potential threats and
119:
and other web-services often directly display or otherwise present data that they fetch from Knowledge which may lead to some users not visiting the Knowledge page (where they might discover other information that goes beyond what they originally looked for but is of interest to them) which may or
123:
Proposed countermeasures or solutions: Google and other sites could display a visible button "read the full Knowledge page" or alike next to that data so that at least if one would be interested in some more info one could easily and quickly get to the appropriate article (as of right now Google
124:
seems to do this for the most part), other tools and services that for instance read snippets of Knowledge articles could have commands built in to somehow open the Knowledge page on their display or some linked device or 'tell me more' for reading the entire page (or its table of contents),
326:
Proposed countermeasures or solutions: linking voters to their arguments and linking these to counterarguments and having internal decision makers pay closer attention to such argumentation-chains, identifying canvassing &
83:
No matter how small the chances are that any other method than government censorship will be used against Knowledge it's worth time and efforts to also take other methods into consideration and protect against these
147:
Proposed countermeasures or solutions: identify them and see what they're making different and why people like to use them and discuss potential changes or extensions
581: 488:
Makes sure that a reestablishment of the site would also work out in practice and publishes information on how to do so if any such isn't yet available
485:
Makes sure that its database downloads are complete and could potentially be used to reestablish the site without any missing data (such as metadata)
75:
Multiple potential threats to Knowledge's survival, accessibility, reach, overall quality and span of content and persistence have been identified.
556: 349:
Proposed countermeasures or solutions: political engagement, improving anonymous / censorship-resistant access-methods (such as creating a
39:
It contains the advice or opinions of one or more Knowledge contributors. This page is not an encyclopedia article, nor is it one of
236: 125: 235:
Proposed countermeasures or solutions: improve anonymous access-methods, a registration group/page for such incidents (see also
427: 304: 268:
Quality decline (e.g. by online marketing, paid editing, Internet trolls, widespread use of bad journalistic research in
188: 569: 497:
Continues awareness campaigns about what Knowledge is and responds to criticism from both internal and external sources
339: 252: 602: 494:
Continues its fight against current and potential censorship and researches new existing, effective ways for doing so
471:
Considering the current state of threats and countermeasures it is proposed that for an adequate response Knowledge:
40: 394:
Proposed countermeasures or solutions: allocating more resources towards the improvement of cybersecurity, improved
107:
However the availability of Knowledge as a free, full download makes it near impossible to fully destroy the site.
248: 303:
Laws and similar measures that damage Knowledge and/or make it significantly harder to maintain it (See also:
403: 44: 200:
Censorship within Knowledge by ill-intentioned administrators or via direct or indirect government control
511: 476: 244: 371:, actively distributing Knowledge, categorically declining any requests made via censorship-blackmailing 319:
Debates getting undermined via non- or semi-substantial arguments and sheer number of voters (See also:
411: 240: 597: 443: 422:
Proposed countermeasures or solutions: Backup finances, decreasing financial running costs (e.g. via
308: 466: 423: 410:, calls for more relevant developers (e.g. by a targeted banner for users who read an article in 350: 224:
Targeted attacks against individual or groups of Knowledge editors (such as harassment, hacking,
104:
improve Knowledge's resilience besides fighting current censorship of Knowledge mainly by China.
458: 439: 62: 521: 516: 551: 536: 168:
Increased usage of potential or current search engines that disadvantage Knowledge results
8: 500:
Makes effective attempts to recruit more security developers to improve its cybersecurity
292: 100: 92: 399: 225: 54: 541: 531: 157: 47:. Some essays represent widespread norms; others only represent minority viewpoints. 32: 575: 526: 383: 343: 96: 78: 447: 395: 342:(may come with demands of changes to Knowledge / Knowledge content) (See also: 288: 176:
Non-governmental / non-nation-wide censorship of Knowledge (e.g. by companies)
591: 320: 546: 479:(e.g. by raising awareness about them), including making them available as 284: 269: 110: 491:
Monitors the search algorithms of major search engines − not just Google
480: 184:
Discreditation campaigns and deterioration of Knowledge's public image
563: 391:
Targeted hacking attacks against Knowledge's technical infrastructure
333: 229: 243:), building ways to prove one's identity if it was stolen (see also 407: 314:
Proposed countermeasures or solutions: lobbying, Knowledge-blackout
280: 153: 368: 360: 353: 116: 216:
Policies becoming inflexible or not adapting to new realities
263:
Proposed countermeasures or solutions: more decentralization,
141: 582:
China taking on Knowledge with its own online encyclopaedia
376: 504: 576:
Turkish authorities block Knowledge without giving reason
457:
Proposed countermeasures or solutions: frequent backups,
438:
Proposed countermeasures or solutions: frequent backups,
364: 357: 260:
Targeted manipulation of Knowledge editors and admins
208:
Incompetence of the WMF (e.g. causing overspending)
382:Proposed countermeasures or solutions: (See also: 156:) that disadvantage Knowledge results (See also: 140:Competitor encyclopedias and services (see also: 589: 570:Russia plans alternative version of 'Knowledge' 557:Knowledge:Imminent death of Knowledge predicted 152:Changes to search engine algorithms (mainly 191:, establishing channels for the Knowledge 132:(Maliciously altered) forks of Knowledge 287:inserting malicious content (See also: 237:Knowledge:Responding to threats of harm 187:Proposed countermeasures or solutions: 126:Knowledge Engine (Wikimedia Foundation) 590: 305:User:Mrs. Jan Cola/EU copyright reform 298:Proposed countermeasures or solutions: 275:Proposed countermeasures or solutions: 219:Proposed countermeasures or solutions: 211:Proposed countermeasures or solutions: 203:Proposed countermeasures or solutions: 179:Proposed countermeasures or solutions: 171:Proposed countermeasures or solutions: 163:Proposed countermeasures or solutions: 135:Proposed countermeasures or solutions: 430:), (See also: #7 of indirect threats) 18: 406:hacking competitions, prioritizing 13: 340:Government censorship of Knowledge 45:thoroughly vetted by the community 41:Knowledge's policies or guidelines 14: 614: 189:m:Propagate the model, not issues 253:m:Help:Two-factor authentication 22: 272:, or hard-to-detect vandalism) 249:Knowledge:User account security 120:may not be considered an issue 1: 467:Proposed contemporary conduct 435:Willful physical destruction 475:Proactively distributes its 91:Considering the rise of the 7: 512:Knowledge:Database download 245:Template:Committed identity 10: 619: 412:Category:Computer security 241:Knowledge:No legal threats 52: 16:Essay on editing Knowledge 444:cooperative storage cloud 309:Knowledge:SOPA initiative 195:to respond to allegations 603:Knowledge warning essays 424:peer-to-peer web hosting 232:and account-takeovers) 459:distributed data store 440:distributed data store 522:Internet manipulation 43:, as it has not been 552:History of Knowledge 537:Security engineering 517:m:Internet-in-a-Box 428:decreasing salaries 400:bug bounty programs 293:Knowledge:Vandalism 228:, blackmailing and 101:information warfare 93:information society 79:Reasons for concern 477:database downloads 454:Natural disasters 226:social undermining 542:Threat assessment 532:Computer security 158:search neutrality 73: 72: 610: 598:Knowledge essays 111:Indirect threats 88:any such occur. 65: 26: 25: 19: 618: 617: 613: 612: 611: 609: 608: 607: 588: 587: 566: 561: 527:Internet outage 507: 469: 408:security-issues 384:DDoS mitigation 367:write access), 344:Help:Censorship 336: 113: 81: 69: 68: 61: 57: 49: 48: 23: 17: 12: 11: 5: 616: 606: 605: 600: 586: 585: 579: 573: 565: 564:External links 562: 560: 559: 554: 549: 544: 539: 534: 529: 524: 519: 514: 508: 506: 503: 502: 501: 498: 495: 492: 489: 486: 483: 468: 465: 464: 463: 462: 461: 452: 451: 450: 448:access control 433: 432: 431: 417: 416: 415: 396:access control 389: 388: 387: 374: 373: 372: 335: 334:Direct threats 332: 331: 330: 329: 328: 317: 316: 315: 301: 300: 299: 289:Knowledge:Spam 278: 277: 276: 266: 265: 264: 258: 257: 256: 222: 221: 220: 214: 213: 212: 206: 205: 204: 198: 197: 196: 182: 181: 180: 174: 173: 172: 166: 165: 164: 150: 149: 148: 138: 137: 136: 130: 129: 128: 112: 109: 80: 77: 71: 70: 67: 66: 63:WP:WIKITHREATS 58: 53: 50: 38: 37: 29: 27: 15: 9: 6: 4: 3: 2: 615: 604: 601: 599: 596: 595: 593: 583: 580: 577: 574: 571: 568: 567: 558: 555: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 509: 499: 496: 493: 490: 487: 484: 482: 478: 474: 473: 472: 460: 456: 455: 453: 449: 445: 441: 437: 436: 434: 429: 425: 421: 420: 418: 413: 409: 405: 401: 397: 393: 392: 390: 385: 381: 380: 378: 375: 370: 366: 363:and allowing 362: 359: 355: 352: 348: 347: 345: 341: 338: 337: 325: 324: 322: 318: 313: 312: 310: 306: 302: 297: 296: 294: 290: 286: 285:Internet bots 282: 279: 274: 273: 271: 267: 262: 261: 259: 254: 250: 246: 242: 238: 234: 233: 231: 227: 223: 218: 217: 215: 210: 209: 207: 202: 201: 199: 194: 190: 186: 185: 183: 178: 177: 175: 170: 169: 167: 162: 161: 159: 155: 151: 146: 145: 143: 139: 134: 133: 131: 127: 122: 121: 118: 115: 114: 108: 105: 102: 98: 94: 89: 87: 76: 64: 60: 59: 56: 51: 46: 42: 36: 34: 28: 21: 20: 547:Threat model 470: 356:-site or an 327:manipulators 192: 106: 90: 85: 82: 74: 30: 446:, improved 31:This is an 592:Categories 419:Finances 404:white hat 230:kompromat 193:community 505:See also 481:torrents 379:attacks 281:Spamming 154:PageRank 55:Shortcut 369:meshnet 361:eepsite 584:, 2017 578:, 2017 572:, 2014 354:.onion 321:WP:DEM 291:& 239:& 117:Google 86:before 270:WP:RS 142:Quora 33:essay 402:and 377:DDoS 283:and 426:or 365:VPN 358:I2P 351:Tor 97:Age 594:: 442:, 398:, 346:) 323:) 311:) 307:, 295:) 251:, 247:, 160:) 144:) 99:, 414:) 386:) 255:) 95:/ 35:.

Index

essay
Knowledge's policies or guidelines
thoroughly vetted by the community
Shortcut
WP:WIKITHREATS
information society
Age
information warfare
Google
Knowledge Engine (Wikimedia Foundation)
Quora
PageRank
search neutrality
m:Propagate the model, not issues
social undermining
kompromat
Knowledge:Responding to threats of harm
Knowledge:No legal threats
Template:Committed identity
Knowledge:User account security
m:Help:Two-factor authentication
WP:RS
Spamming
Internet bots
Knowledge:Spam
Knowledge:Vandalism
User:Mrs. Jan Cola/EU copyright reform
Knowledge:SOPA initiative
WP:DEM
Government censorship of Knowledge

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.