cross pond high tech
159.9K views | +0 today
Follow
cross pond high tech
light views on high tech in both Europe and US
Your new post is loading...
Your new post is loading...
Scooped by Philippe J DEWOST
Scoop.it!

The Epstein scandal at MIT shows the moral bankruptcy of techno-elites

The Epstein scandal at MIT shows the moral bankruptcy of techno-elites | cross pond high tech | Scoop.it

The MIT-Epstein debacle shows ‘the prostitution of intellectual activity’ and calls for a radical agenda pleads Evgeny Morozov.

As Frederic Filloux points in today's edition of The Monday Note,

"It matters because the MediaLab scandal is the tip of the iceberg. American universities are plagued by conflicts of interest. It is prevalent at Stanford for instance. I personally don’t mind an experienced professor charging $3,000 an hour to talk to foreign corporate visitors or asking $15,000 to appear at a conference. These people are high-valued and they also often work for free when needed. What bothers me is when a board membership collides with the content of a class, when a research paper is redacted to avoid upsetting a powerful VC firm who provides both generous donations and advisory fees to the faculty, when a prominent professor regurgitates a paid study they have done for a foreign bank as a support of a class, or when another keeps hammering Google because they advise a direct competitor. This is unethical and offensive to students who regularly pay $60,000-$100,000 in tuition each year."

Philippe J DEWOST's insight:

MIT sounds like "Money Infused Technology" : shall we close the Media Lab, disband Ted Talks and refuse tech billionaires money ?

No comment yet.
Rescooped by Philippe J DEWOST from Consensus Décentralisé - Blockchains - Smart Contracts - Decentralized Consensus
Scoop.it!

Fully homomorphic encryption, or how to perform operations over encrypted data | Orange Research blog

Fully homomorphic encryption, or how to perform operations over encrypted data | Orange Research blog | cross pond high tech | Scoop.it

Can we outsource medical analysis without giving away our medical information? Can we do biometrical identification without revealing our characteristics? Can we make statistics on data that we do not know? Yes we can, thanks to a cryptographic mechanism called “homomorphic encryption”.

Cryptography has known many transformations over the years. Many centuries ago, it was first used to protect military and political communications. Though very simple, the mechanisms then devised are still the foundation of current cryptography. The introduction of the computer during Second World War considerably increased the computation capacity. This increase reflected on cryptography in the late 70’s, when public key cryptography was invented. Cryptography became a thriving scientific field. Numerous academic works were produced, commercial standards were set and cryptographic algorithms began to secure our daily life. Today, cryptography is everywhere: in our credit cards, in our phone communications, in our internet browsing, etc.
But new services are today under deployment, such as mobile services, cloud computing, BigData or IoT. These services generate and process a huge amount of personal and sensitive information. As users become more and more concerned about their privacy, and industries want to protect their sensitive data, a new challenge arises for cryptography. Indeed, if this data was to be simply encrypted, processing it would be impossible. This leaves users and service providers with a dilemma: choose between usability and confidentiality of these sensitive data. Here comes fully homomorphic encryption!

Philippe J DEWOST's curator insight, February 14, 2017 10:57 AM

Here is a fantastic "paper" by Orange Research that deciphers homomorphic encryption in a very clear way, and outlines its future and challenges.