AI is only as good as the data behind it.
Incomplete recordings = unreliable insights.
Thatโs why Revcord focuses on secure, dependable recordings firstโthen builds AI tools like ReVI on top of that foundation.
AI is only as good as the data behind it.
Incomplete recordings = unreliable insights.
Thatโs why Revcord focuses on secure, dependable recordings firstโthen builds AI tools like ReVI on top of that foundation.
โUpdate on Plagiarism and Falsification in Scientific Publications
Today, I officially submitted requests for the retraction of articles to the editorial boards of the journals "Land Reclamation and Water Management" and "Bulletin of NUWM".
โKey facts of misconduct:
๐น Plagiarism: Unauthorized use of my original relief map (2015) without citation.
๐น Falsification: Intentional removal (retouching) of the authorโs stamp with coordinates and date-time on site photographs.
๐น Duplication: Publication of identical material in 2021 and 2024.
Next steps:
In the event of attempts to covertly remove the articles without an official retraction notice, relevant complaints will be forwarded directly to @crossref and the international members of the editorial boards.
#OpenScience #ResearchMisconduct #AcademicMastodon #ScientificIntegrity #Hydrology #Geoscience #GIS #FediScience #Plagiarism #SvystunovaGully #COPE #Crossref #DataIntegrity #ImageManipulation #AcademicChatter #ResearchEthics #EarthScience #HigherEducation
The Hamming Quasi-Cyclic (HQC) Algorithm: An Overview
Hamming Quasi-Cyclic (HQC) ์๊ณ ๋ฆฌ์ฆ์ ์ค๋ฅ ์ ์ ์ฝ๋ ๋ถ์ผ์์ ํจ์จ์ฑ๊ณผ ๊ฐ๋ ฅํ ์ฑ๋ฅ์ ๊ฒฐํฉํ ํ์ ์ ๋ฐฉ๋ฒ์ผ๋ก, ํนํ ์ฝ๋ ๊ธฐ๋ฐ ์ํธํ๊ณผ ํฌ์คํธ ์์ ๋ณด์์ ์ ํฉํ๋ค. HQC๋ ์ค์ํ ๊ตฌ์กฐ๋ฅผ ํ์ฉํด ์ธ์ฝ๋ฉ๊ณผ ๋์ฝ๋ฉ ๊ณผ์ ์ ์ต์ ํํ๋ฉฐ, ํต์ ๊ณผ ๋ฐ์ดํฐ ์ ์ฅ์์ ๋ฐ์ดํฐ ๋ฌด๊ฒฐ์ฑ์ ๋ณด์ฅํ๋ ๋ฐ ์ค์ํ ์ญํ ์ ํ๋ค. ๊ธฐ์กด์ Reed-Solomon, Turbo ์ฝ๋ ๋๋น ๊ณ์ฐ ํจ์จ์ฑ๊ณผ ์์ ๊ณต๊ฒฉ์ ๋ํ ๋ด์ฑ์ ๊ฐ์ถ๊ณ ์์ด ์ฐจ์ธ๋ ๋ณด์ ํต์ ์ ์ ๋งํ๋ค. ๋ค๋ง, ๊ณ์ฐ ๋ณต์ก์ฑ๊ณผ ๊ธฐ์กด ์์คํ ๊ณผ์ ํตํฉ ๋ฌธ์ ๋ฑ ๊ตฌํ์์ ๋์ ๊ณผ์ ๊ฐ ์กด์ฌํ๋ค.
#errorcorrection #postquantumcryptography #hammingquasicyclic #codebasedcryptography #dataintegrity
โ While preparing a literature review for my monograph on the hydrogeochemical impact of mine waters, I discovered the unauthorized use of my original materials in articles published in 2021 and 2024. Both publications were prepared with the primary involvement of staff from the Institute of Water Problems and Land Reclamation of the National Academy of Agricultural Sciences of Ukraine (IWPLR NAASU).
An analysis revealed facts that go beyond a simple copyright violation:
๐น Data Falsification: Original photo metadata (date, time, GPS) was intentionally retouched to conceal their 2015 origin and authorship.
๐น Methodological Anachronism: Using 2015 data for 2024 modeling renders results invalid by ignoring the major infrastructure overhaul launched in early 2025.
๐น Institutional Failure: This misconduct by state academy staff signals a systemic collapse of research quality control and ethical oversight within the institutions.
#ScientificMisconduct #SvystunovaGully #ResearchEthics #DataIntegrity #Plagiarism
Ben Dechrai presents 'Ten Key Steps for Enhanced Web App Security' this July at Nebraska.Code().
https://nebraskacode.amegala.com/
#WebApps #WebAppSecurity #DataIntegrity #SoftwareCraftsmanship #WebVulnerabilities #WebSecurity #CyberSecurity #TechConference #softwaredevelopment #SiliconPrairie #HeartlandDevelopers #Tech
RE: https://mastodon.social/@arstechnica/116518027082154811
This technique is commonly used for insider detection. Plant a unique canary in a datasource someone has access to and see which canary shows up and you have the leaker.
Another technique inverted to this purpose to spot manipulation without using obvious hashes or digital signatures is to insert a specific message into a plaintext that may be formatted wrong or not comply with the uniformity then get a HMAC signature out of it. Loop through the data and check if the MAC is created. This is called Chaffing and Winnowing:
https://en.wikipedia.org/wiki/Chaffing_and_winnowing
#cryptography #insiderdetection #espionage #dataintegrity #manipulation
Transaction logs enable point-in-time recovery in financial databases. By replaying log entries up to a specific moment, a system can reconstruct its exact state before a failure, data corruption, or erroneous transaction.
Pessimistic Locking is a concurrency control strategy that locks a resource before accessing it. It assumes conflicts are likely, preventing other transactions from reading or modifying locked data until the lock is released.