<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Incognito &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/incognito/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Sun, 06 Jun 2021 08:07:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>UC Browser secretly collects browsing data of iPhone users</title>
		<link>https://en.spress.net/uc-browser-secretly-collects-browsing-data-of-iphone-users/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Sun, 06 Jun 2021 08:07:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alibaba]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[browsing]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[collects]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Gabi Cirlig]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[secret]]></category>
		<category><![CDATA[secretly]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Surfing the web]]></category>
		<category><![CDATA[UC Browser]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/uc-browser-secretly-collects-browsing-data-of-iphone-users/</guid>

					<description><![CDATA[Recently, security researcher Gabi Cirlig discovered that UC Browser (a fairly popular mobile browser) was secretly sending iPhone users&#8217; browsing data to servers in China. The collected data even includes IP addresses, which can be used to track the approximate location of the user. UC Browser is developed by UCWeb, a subsidiary of Alibaba (China). [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, security researcher Gabi Cirlig discovered that UC Browser (a fairly popular mobile browser) was secretly sending iPhone users&#8217; browsing data to servers in China.</strong><br />
<span id="more-21025"></span> The collected data even includes IP addresses, which can be used to track the approximate location of the user.</p>
<p> UC Browser is developed by UCWeb, a subsidiary of Alibaba (China). This is one of the most popular mobile browsers in Asia, with over 500 million downloads on Google Play alone. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_331_39051919/1e841e3a0f78e626bf69.jpg" width="625" height="352"> According to security researcher Gabi Cirlig, UC Browser silently sent iPhone users&#8217; browsing data (even with incognito mode enabled) to UCWeb servers (registered in China, but located in the US). ). This is in stark contrast to the company&#8217;s previous statement, which does not record a user&#8217;s &#8220;browsing and search history&#8221; when incognito mode is activated. More worryingly, UC Browser also collects IDs (unique identifiers) to track users across various websites. The collection of user data happens on both Android and iOS versions, not sure what UCWeb is doing with all this information? Interested readers can watch the video at: “This kind of tracking is done on purpose,” Cirlig told Forbes. When compared with Google Chrome browser and some other popular browsers, he found there is no browser like UC Browser. UC Browser just rolled out a new update last week, but the company never mentioned monitoring users&#8217; browsing activity. Currently the English version of UC Browser has been removed from the App Store, but the Chinese version still exists, and unlike the English version, it does not send data back to the UCWeb server. Earlier in 2019, the UC Browser version for Android also violated Google Play&#8217;s policies.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21025</post-id>	</item>
		<item>
		<title>Mysterious stone arch appeared in England</title>
		<link>https://en.spress.net/mysterious-stone-arch-appeared-in-england/</link>
		
		<dc:creator><![CDATA[Cường Lê]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 17:50:08 +0000</pubDate>
				<category><![CDATA[Travel]]></category>
		<category><![CDATA[appeared]]></category>
		<category><![CDATA[Arc]]></category>
		<category><![CDATA[arch]]></category>
		<category><![CDATA[Artwork]]></category>
		<category><![CDATA[Author]]></category>
		<category><![CDATA[Bbc]]></category>
		<category><![CDATA[Climb the mountain]]></category>
		<category><![CDATA[Crafting]]></category>
		<category><![CDATA[England]]></category>
		<category><![CDATA[Enjoy]]></category>
		<category><![CDATA[equals]]></category>
		<category><![CDATA[Framed]]></category>
		<category><![CDATA[Graffiti]]></category>
		<category><![CDATA[Great]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[Lake District]]></category>
		<category><![CDATA[Mysterious]]></category>
		<category><![CDATA[Nowadays]]></category>
		<category><![CDATA[Roof]]></category>
		<category><![CDATA[scenery]]></category>
		<category><![CDATA[Sculpture]]></category>
		<category><![CDATA[secret]]></category>
		<category><![CDATA[Slate]]></category>
		<category><![CDATA[stone]]></category>
		<guid isPermaLink="false">https://en.spress.net/mysterious-stone-arch-appeared-in-england/</guid>

					<description><![CDATA[Mysterious works of art appeared in the Lake District, England, causing many people to amuse and wonder who is the author of this wonderful creation. Some climbers and residents traveling through the Lake District, a mountainous area in North West England, have discovered a number of unique slate and arched structures that many people are [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Mysterious works of art appeared in the Lake District, England, causing many people to amuse and wonder who is the author of this wonderful creation.</strong><br />
<span id="more-20356"></span> Some climbers and residents traveling through the Lake District, a mountainous area in North West England, have discovered a number of unique slate and arched structures that many people are interested in. It is not yet known who created these works, <em> BBC</em> reported on May 19.</p>
<p> Many Borrowdale Valley residents refer to the mysterious works as &#8220;Banksy&#8217;s work&#8221; &#8211; an anonymous graffiti artist who has become an icon of contemporary British street art &#8211; because no one knows who created them. them. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_119_38899990/2e4405271f65f63baf74.jpg" width="625" height="755"> <em> The work is crafted from slate, overlooking the Borrowdale valley, England. Photo: Borrowdale Institute. </em> Mr. Shawn Williamson, a sculptor in Windermere, said above <em> BBC Radio Cumbria</em> : &#8220;These works are made up of large pieces of slate that are arched to frame the landscape behind it. There have been many artists in the past who have created similar works and each has a unique touch own uniqueness”. &#8220;This piece really shows the colors of the Lake District and traditional local crafts, interwoven with the wonderful natural scenery of this place. All of which makes them extremely mysterious.&#8221; , Mr. Shawn Williamson added. Photographer Carl Halliday took pictures of the rock formations and posted them online. The photos have attracted a lot of attention from the online community. <em> BBC</em> The location of these works of art is not given specifically because some areas have terrain that could be dangerous for curious residents.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20356</post-id>	</item>
		<item>
		<title>How do criminals turn crypto into cash?</title>
		<link>https://en.spress.net/how-do-criminals-turn-crypto-into-cash/</link>
		
		<dc:creator><![CDATA[Linh Đỗ]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 11:18:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Bitcoin Fog]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[cash]]></category>
		<category><![CDATA[CHAINLYSIS]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[criminals]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[ELLIPTIC]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Exchanges]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[HYDRA]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[King Law Firm]]></category>
		<category><![CDATA[Michael Phillips]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Tom Robinson]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[Turn into]]></category>
		<category><![CDATA[VMWARE]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-do-criminals-turn-crypto-into-cash/</guid>

					<description><![CDATA[In the world of cybercrime, cryptocurrency is the preferred form of payment. But ultimately, criminals still need to convert electronic assets into cash. According to the Financial Times When it comes to converting cryptocurrencies into cash, criminals often go to the Treasure Men group. To contact this group, simply go to the Hydra dark web. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the world of cybercrime, cryptocurrency is the preferred form of payment. But ultimately, criminals still need to convert electronic assets into cash.</strong><br />
<span id="more-20294"></span> According to the <em> Financial Times</em> When it comes to converting cryptocurrencies into cash, criminals often go to the Treasure Men group. To contact this group, simply go to the Hydra dark web. It is the largest online marketplace on the dark web by revenue.</p>
<p> &#8220;This group leaves cash in specific places &#8211; behind a bush or under a bus seat &#8211; for criminals to get. They send specific location instructions. This is a whole new profession.&#8221; <em> Financial Times</em> quoted Dr. Tom Robinson, founder of Elliptic organization specializing in analyzing cryptocurrency transactions. The dark web site Hydra (Russian) offers a variety of methods for criminals to exchange cryptocurrency for cash, for example exchanging Bitcoins for gift certificates, debit cards or iTunes vouchers. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_119_39022986/7fddf4c8e38a0ad4539b.jpg" width="625" height="413"> <em> Special software is required to access the Hydra dark web. Photo: ZDNet. </em> <strong> Anonymous but still leaving traces</strong> According to experts, the ability to store cryptocurrency without providing an identity makes this currency especially attractive to many criminal gangs, especially hackers specializing in breaking into networks of businesses. and demand ransom. Statistics from research firm Chainalysis show that in 2020, businesses and organizations paid at least $350 million in cryptocurrency ransoms to a number of hacker groups, including DarkSide, the group that attacked the pipeline system. Colonial Pipeline earlier this month. But while anonymous, cryptocurrency transactions are recorded on an immutable blockchain system, leaving a clear trail for anyone with any knowledge of the technology. A number of investigative firms have been established to assist national authorities in tracking various criminal gangs by analyzing the flow of cryptocurrency transactions. Chainalysis (headquartered in New York, USA) is one such company. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_119_39022986/70cce6d9f19b18c5418a.jpg" width="625" height="315"> <em> Binance cryptocurrency exchange. In 2011-2019, cryptocurrency exchanges supported the conversion to cash of about 60-80% of Bitcoin transactions by criminal groups. Photo: Binance. </em> Chainalysis raised $100 million in its initial public offering, reaching a valuation of over $2 billion. There are also Elliptic (headquartered in London, UK) and CipherTrace, a company supported by the US government. Chainalysis said that in 2020, some illegal organizations receive about 5 billion USD and transfer 5 billion USD to other organizations. This represents almost 1% of all global crypto flows. Initially, the criminals only withdrew funds through major cryptocurrency exchanges. Elliptic estimates that between 2011 and 2019, cryptocurrency exchanges supported the conversion of about 60-80% of Bitcoin transactions by illegal organizations into cash. <strong> Take advantage of crypto ATMs</strong> Since last year, exchanges have been concerned about the tightening of regulations by many governments, so they have begun to apply anti-money laundering (AML) and customer identity verification (KYC) processes. This change pushes criminals to unlicensed exchanges. Still, expert Michael Phillips of online insurance company Resilience said that unlicensed exchanges have low liquidity, making it difficult for criminals to convert crypto to fiat. &#8220;The goal is to make it more expensive for criminals to convert money,&#8221; he explained. However, criminals still have a way around. Research by Chainalysis shows that some intermediaries are quietly assisting gangs in conducting many illegal money conversion transactions. Meanwhile, small-scale transactions still flow through more than 11,600 crypto ATMs worldwide without any control, or through gambling sites that accept crypto payments. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_119_39022986/98e80cfd1bbff2e1abae.jpg" width="625" height="351"> <em> Criminals can use crypto ATMs to get cash. Photo: EPA. </em> Faced with that situation, crypto security companies use the technology of analyzing blockchain transactions and intelligence to determine which crypto wallets belong to criminal gangs. At the same time, they provide an overview of the global crypto crime ecosystem. As a result, companies discovered that many hacker groups lease ransomware to criminal networks. Kimberly Grauer, director of research at Chainalysis, said hackers also pay support services to other criminal groups in cryptocurrency. Thus, a criminal cryptocurrency ecosystem has been formed on a global scale. &#8220;We were able to see the ransom transactions, how the gangs split the money and how that money went to groups in the system,&#8221; Grauer said. <strong> The tricks are getting more and more sophisticated</strong> However, cybercriminals are increasingly using a variety of high-tech tools to obscure the traces of cryptocurrency transactions. Some criminals use &#8220;chain-hopping&#8221; &#8211; repeatedly switching between different cryptocurrencies &#8211; to avoid the eyes of security companies. In addition, they use a “privacy cryptocurrency” like Monero, which has a high degree of anonymity. Another tool commonly used by criminals is a “mixer,” a third-party service that mixes illegal cryptocurrencies with clean money, before pushing them back onto the market. In April, the US Department of Justice arrested a Swedish citizen of Russian origin, who specialized in operating a &#8220;mixing&#8221; service called Bitcoin Fog. During the past 10 years, this guy has transferred a total of 335 million USD in Bitcoin. Governments need to modernize confiscation and asset freezing processes to make it easier to confiscate cryptocurrencies from exchanges. <strong> Tom Kellerman, director of cybersecurity strategy at VMware V</strong> “It is possible to untangle mixed cryptocurrencies. However, that requires high technology and a lot of processing and data power,” said Katherine Kirkpatrick, director of law firm King &#038; Spalding. According to Elliptic, the popular 2020 coin mixers are highly anonymous &#8220;personal wallets&#8221;. They supported 12% of Bitcoin wash transactions last year. Tom Kellerman, director of cybersecurity strategy at VMware and a member of the US Secret Service&#8217;s advisory board, said that governments need to modernize the process of confiscating and freezing assets for law enforcement. easily confiscate cryptocurrencies from exchanges. In the past, blockchain security experts have floated the idea of ​​sharing a &#8220;blacklist&#8221; of crypto wallets used by criminals with exchanges, analytics firms, and governments. “Now is the right time to consider that initiative.” <em> he </em> Kemba Walden of Microsoft&#8217;s Digital Crimes Unit.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20294</post-id>	</item>
		<item>
		<title>Russian intelligence set up a system to receive confidential information on the darknet</title>
		<link>https://en.spress.net/russian-intelligence-set-up-a-system-to-receive-confidential-information-on-the-darknet/</link>
		
		<dc:creator><![CDATA[Xuân Chi/Báo Tin tức]]></dc:creator>
		<pubDate>Tue, 27 Apr 2021 01:58:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Click]]></category>
		<category><![CDATA[confidential]]></category>
		<category><![CDATA[Confidential news]]></category>
		<category><![CDATA[darknet]]></category>
		<category><![CDATA[Display]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Main page]]></category>
		<category><![CDATA[News report]]></category>
		<category><![CDATA[Pretty Good Privacy]]></category>
		<category><![CDATA[Receive]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russia Beyond]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[Search]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[SVR]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Tip water]]></category>
		<category><![CDATA[Tor]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[VRS]]></category>
		<guid isPermaLink="false">https://en.spress.net/russian-intelligence-set-up-a-system-to-receive-confidential-information-on-the-darknet/</guid>

					<description><![CDATA[The system allows users in restricted environments to report confidential information to Russian intelligence services. SVR&#8217;s secure messaging system interface on Tor. Photo: The Record Those with information about imminent threats to Russia can now &#8220;tease&#8221; Russian intelligence agencies using the Tor browser on the darknet (network of inaccessible websites. from search engine). According to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The system allows users in restricted environments to report confidential information to Russian intelligence services.</strong><br />
<span id="more-9227"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_294_38602782/ef8c8bd8ae9a47c41e8b.jpg" width="625" height="399"> </p>
<p> <em> SVR&#8217;s secure messaging system interface on Tor. Photo: The Record</em> Those with information about imminent threats to Russia can now &#8220;tease&#8221; Russian intelligence agencies using the Tor browser on the darknet (network of inaccessible websites. from search engine). According to Russia Beyond, the announcement of a new confidential information system and other information related to Russian national security has just been posted on the website of the General Department of Foreign Intelligence (SVR). By clicking on the button &#8220;Report information&#8221; in the bottom left corner of the main page, users receive specific instructions as follows: &#8220;If you are outside Russia and have important information related to An urgent threat to the security of the Russian Federation, you can securely and anonymously share it with us through SVR&#8217;s virtual reception system (VRS) over the TOR network ”. The SVR claims the new darknet system will allow notified individuals to securely and anonymously share data and details with local authorities. It also provides a public PGP key as an additional layer of security for encrypting messages sent over the new virtual receiving system (VRS). When a user first visits this website for the purpose of sending information related to Russian national security, they will receive a 5-word code needed to decode the intelligence messages if they wish. contact the recipient of the denunciation</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9227</post-id>	</item>
		<item>
		<title>The machine learning model determines Covid-19 fake news</title>
		<link>https://en.spress.net/the-machine-learning-model-determines-covid-19-fake-news/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 24 Apr 2021 02:35:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Add tightening]]></category>
		<category><![CDATA[Change]]></category>
		<category><![CDATA[Conspiracy]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Determined]]></category>
		<category><![CDATA[determines]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[False]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[Hypothesis]]></category>
		<category><![CDATA[Importance]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[Information system]]></category>
		<category><![CDATA[learning]]></category>
		<category><![CDATA[machine]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Model]]></category>
		<category><![CDATA[Modeling]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Paradigm]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Same author]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[theory]]></category>
		<category><![CDATA[words]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-machine-learning-model-determines-covid-19-fake-news/</guid>

					<description><![CDATA[A new machine learning program accurately identifies hypotheses related to Covid-19 on social media. The change in the importance of words over time for social media posts. The program will then model how they evolve over time. This new tool is expected to help the medical industry combat misinformation online. &#8220;A lot of machine learning [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A new machine learning program accurately identifies hypotheses related to Covid-19 on social media.</strong><br />
<span id="more-7323"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_181_38590618/7a8bf94edc0c35526c1d.jpg" width="625" height="419"> </p>
<p> <em> The change in the importance of words over time for social media posts.</em> The program will then model how they evolve over time. This new tool is expected to help the medical industry combat misinformation online. &#8220;A lot of machine learning studies involve misinformation,&#8221; said Courtney Shelley, a postdoctoral fellow with the Modeling and Information Systems Group at the Los Alamos National Laboratory, and co-author of the study. Social media focuses on identifying different types of conspiracy theories. Instead, we want to create a more cohesive understanding of how misinformation changes as it is spread. People tend to believe the first message they get, the expert explains. So in the future, the health sector can keep track of which theories are attracting attention on social media. From there, help the health sector create real information, prevent the public from &#8220;accepting&#8221; fake news. Under the title &#8220;Thought I want to share first&#8221;, the study used anonymous Twitter data to describe four Covid-19 related topics. Using the collected data for each topic, the team built random machine learning models or artificial intelligence (AI). Then help classify whether that information is wrong or not. &#8220;This allows us to observe how individuals talk about this information on social media and see changes over time,&#8221; says co-author Dax Gerts. Research shows that posts that contain misinformation carry more negative emotions than usual. At the same time, these fake news tend to develop over time. Because, they are &#8220;augmented&#8221; details from other topics as well as events in the real world. Furthermore, the study found that surveillance machine learning could be used to automatically identify conspiracy theories. In addition, the unsupervised learning method can be used within each topic, to uncover changes in the importance of words. “It is important for health officials to know how conspiracy theories are evolving and attracting over time. If not, they run the risk of unintentionally making fake news publicly. So it&#8217;s important to know how conspiracy theories are changing and how they can incorporate other theories or real-world facts. As a result, helping to strategize coping with factual disclosure campaigns, ”said researcher Courtney Shelley.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7323</post-id>	</item>
		<item>
		<title>Tragedy from social networks</title>
		<link>https://en.spress.net/tragedy-from-social-networks/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 16 Apr 2021 16:56:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Bullying]]></category>
		<category><![CDATA[Daily Mail Australia]]></category>
		<category><![CDATA[Department of Information and Communications]]></category>
		<category><![CDATA[Henrietta Fore]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[INSTAGRAM]]></category>
		<category><![CDATA[IPSOS]]></category>
		<category><![CDATA[Lee]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Pham The Truong]]></category>
		<category><![CDATA[Sheepdog]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Teenager]]></category>
		<category><![CDATA[Tragedy]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[Trouble]]></category>
		<category><![CDATA[UNICEF]]></category>
		<category><![CDATA[Victim]]></category>
		<category><![CDATA[WIL]]></category>
		<guid isPermaLink="false">https://en.spress.net/tragedy-from-social-networks/</guid>

					<description><![CDATA[Lee MacMillan, the star on Instagram, recently ended his life in tragedy. She is one of the victims of online bullying. Lee MacMillan, the star on the social network Instagram, recently ended his life in tragedy. She is one of the victims of online bullying, an extremely dangerous flip side from social networks. Lee MacMillan [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Lee MacMillan, the star on Instagram, recently ended his life in tragedy. She is one of the victims of online bullying.</strong><br />
<span id="more-3131"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_23_38533175/62a264ca4e88a7d6fe99.jpg" width="625" height="281"></p>
<p><strong>Lee MacMillan, the star on the social network Instagram, recently ended his life in tragedy. She is one of the victims of online bullying, an extremely dangerous flip side from social networks. </strong></p>
<p>Lee MacMillan is a blogger with 74,000 followers on Instagram. The 28-year-old girl, famous for her van adventures with ex-boyfriend Max Bidstrup. Both have traveled from Canada to the Americas, South Africa &#8230; with the shepherd dog. At the end of January 2020, the couple announced the way everyone went, making many fans feel regretful.</p>
<p>At that time, in addition to words of comfort and encouragement, Lee also became the subject of some fans blaming and stoning. Gradually, the young girl fell into a state of depression before taking her own life. According to Lee&#8217;s family, the people who are always trying to bully Lee online are a small group of 74,000 fanpage followers.</p>
<p>They let go of her disparaging words for a long time. &#8220;<em>Unfortunately, Lee has faced some sort of criticism and they have deeply influenced her. Our help was not enough for her to overcome the negative emotions they caused</em>&#8220;The father of the Instagram social network star,&#8221; said Wil, sadly.</p>
<p>According to Daily Mail Australia, the Lee family hopes their daughter&#8217;s story can shed light on the devastating effects of cyberbullying can have on a person&#8217;s psychological health.</p>
<p><strong>A global issue</strong></p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_23_38533175/2916107e3a3cd3628a2d.jpg" width="625" height="445"></p>
<p><em>Ipsos survey of cyberbullying in several countries. Photo: Statista</em></p>
<p>The United Nations Children&#8217;s Fund (Unicef) defines “cyber bullying” as bullying using digital technology. It can take place on social media, messaging platforms, gaming platforms, and mobile phones. It is repetitive behavior, intended to frighten, anger, or embarrass the targeted people.</p>
<p>There are various forms of bullying on the Internet, such as the spread of lies, malicious rumors, and offensive comments; Post embarrassing photos of someone on social media; Sending harassing or threatening messages through messaging platforms; Impersonating someone online to send malicious messages to others &#8230;</p>
<p>In fact, bullying has always been a headache for many people and society for a long time. Now, with the use of social media becoming ubiquitous around the world, bullies are taking advantage of the &#8220;high-tech path&#8221; to commit these evils. There are no age or gender restrictions on victims of cyberbullying.</p>
<p>In September 2020, Microsoft released the results of an online bullying study, which found that 38% of people in 32 countries said they had been involved in a bullying case, as victim, bully or bystander.</p>
<p>In Vietnam, 51% of internet users, including 48% of adults and 54% of teenagers, said they had been involved in a &#8220;bullying case&#8221;, 21% said they had been a victim and 38 % are bystanders or witnesses bullying or harassment.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_23_38533175/b2b38edba4994dc71488.jpg" width="625" height="437"></p>
<p><em>Rates of online bullying among Vietnamese students through studies from 2015 to 2017. Photo: UED Media</em></p>
<p>The study also surveyed adults about bullying, also known as &#8220;harassment&#8221;, both inside and outside the workplace. In Vietnam, 15% reported seeing bullying at their workplace and 44% reported having experienced bullying outside of their workplace.</p>
<p>According to another survey by Unicef ​​and the special representative of the United Nations Secretary-General on Violence against Children, published in September 2019, one-third of teenagers in 30 countries said they were once victims of cyberbullying, of which one in five said they had dropped out of school because of cyberbullying and violence.</p>
<p>Surveys via anonymous messages are conducted through U-Report. More than 170,000 U-Report users aged 13-24 participated in this survey, including teenagers from Albania, Bangladesh, Belize, Bolivia, Brazil, Côte d&#8217;Ivoire, Ecuador, France, Gambia, Ghana , India, Indonesia, Iraq, Jamaica, Malaysia, Myanmar, Vietnam &#8230;</p>
<p>&#8220;<em>Today, the classroom space connecting with the outside world also means that school hours no longer end by the time students leave the classroom, and sadly, bullying doesn&#8217;t stop there.</em>&#8220;, Ms. Henrietta Fore, CEO of Unicef ​​organization said.</p>
<p>With the Covid-19 epidemic still going unpredictable, when measures are taken, children and adolescents have used online platforms more often as they have to learn from far. And as a result, the number of online bullying cases is certainly increasing.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_23_38533175/c6faf692dcd0358e6cc1.jpg" width="625" height="341"></p>
<p><em>The level of bullying among high school students, according to a 2018 survey of the Department of Psychology &#8211; Education, Da Nang Pedagogical University on cyberbullying, with the participation of more than 500 high school students. In the city.</em></p>
<p><strong>Virtual bullying, real impact</strong></p>
<p>Mr. Pham The Truong, General Director of Microsoft Vietnam, commented: “<em>Cyberbullying has real-world consequences. In the case of cyberbullying, victims can be harmed at any time of the day by anonymous sources, and it is likely that the incident will be spread to a large number of people. People of all ages can be affected by online abuse, cruelty and abuse</em>&#8220;.</p>
<p>Globally, when asked about the effects of workplace bullying, survey participants reported feeling humiliated (58%) globally, according to a Microsoft survey. ), followed by mental loss (52%) and loss of confidence (51%).</p>
<p>The effects also vary between generations. 53% of respondents aged 18-24 reported feeling isolated and depressed, while Gen X generation (those born between the 1960s and early 1980s) were underperforming. more fruit (58%). People who experience online bullying or harassment at work also reported feeling &#8220;unbearable or severe&#8221; pain.</p>
<p>When it comes to online bullying or harassment, Microsoft says, most people in Vietnam block bullies (63%) or share with friends about what happened (58%). , the rest ignored the bully (43%). 50% of survey respondents said that they reported behavior to social media companies or other providers.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_23_38533175/51ed60854ac7a399fad6.jpg" width="625" height="453"></p>
<p><em>Rate of bullying online in the world from 2008 to 2018. Photo: UED Media</em></p>
<p>In its report, Microsoft encourages people of all ages to report any online threats or harassment to the relevant online service provider. User reports play a key role in providing everyone with a safe and reliable online experience.</p>
<p>In the third quarter of 2020, the artificial intelligence (AI) system of Facebook discovered and removed 94.7% of the 22.1 million content that provoked hate on social pages; increased from 80.5% out of 6.9 million content over the same period of the previous year. Facebook is taking steps to use AI to remove these content from its platform.</p>
<p>&#8220;<em>Online bullying is out of control in the world, and it needs to be stopped. People involved in this behavior must understand that their actions have real consequences. We need to find a way to stop them and the platforms for this to happen accountable</em>&#8220;Lee MacMillan&#8217;s father said.</p>
<p><em>According to Mr. Luu Dinh Phuc, Director of the Department of Information and Communications (Ministry of Information and Communications), Vietnam has specific regulations on behavior on domestic websites. For overseas social networking platforms, offended persons can immediately report such platforms so that they can take measures to remove them, or send information to regulatory agencies such as the Department of Information and Communications, media information and local authorities.</em></p>
<p><em>The Department of Information and Communications has now established channels to request cross-border platforms to remove bad and malicious information. The Department has also set up a center to receive and process fake news at the address </em><em><strong>tingia.gov.vn</strong></em><em> and the introduction of prefix reception reflecting fake news </em><em><strong>18008108</strong></em><em>. This center has the role of receiving, assessing and publishing fake news about information that may cause negative effects on the community, and offend the honor and dignity of individuals. </em></p>
<p><em>Information given by the fake news processing center will be shared on social networking sites, forums and newspapers for the community to understand, thereby reducing the disadvantages. In addition, when the center has announced fake news, the functional forces will base on that to investigate whether the objects spread inside or outside the country to handle. Mr. Phuc also added that in the coming time, the department will set up a specialized room dealing with fake news. </em></p>
<p><strong>Le Minh</strong></p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_23_38533175/f4c1dda9f7eb1eb547fa.jpg" width="625" height="283"></p>
<p><em>Lee MacMillan is a star on the social network Instagram. Photo: People</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3131</post-id>	</item>
	</channel>
</rss>