fbpx

Leafy sees

Leafy sees- News, Politics, artwork ^and more

Leafy


  • The stand in the middle cyber defender method explained

    The concept of a stand-alone-in-the-middle cyber defender refers to an individual or entity that takes responsibility for protecting their online security and privacy . Individuals or small groups often take this approach with unique or sensitive security needs that larger entities may not adequately address. For example , journalists or activists working in high-risk environments…


  • Speaking the language of the oppressed

    An introduction to the language of the oppressed As we see that language is a powerful tool that can empower or oppress individuals and communities; we make a moral commitment to use language in an ethical manner As language activists, we aim to bridge the gap between those who have been silenced and those who…


  • Environmental Activist Sam Rajabi Returns to Evin Prison After End of Furlough

    Iranian environmental activist Sam Rajabi returned to Evin prison after completing his furlough leave on March 3, 2023 . Rajabi, a well-known environmentalist, was arrested in September 2022 , along with several other activists, due to their work on environmental issues . International human rights groups criticized the arrests and called for the activists’ release…


  • human-machine hybrid translation

    As a translator with a social agenda, I aim to promote understanding and empathy across cultures and languages. One of the ways I achieve this goal is by working with AI translation tools like ChatGPT. While machine translation can be a powerful tool in bridging the language barrier , it is essential to be mindful…


  • “passive income”

    The term “passive income” is frequently used in finance and entrepreneurship to describe a source of revenue that requires minimal effort or ongoing involvement. However, this loaded phrase can be misleading and even dangerous, mainly as a selling point for potential pyramid schemes. A language is a powerful tool that can be used to manipulate…


  • Jumping a semantic hill

    To my dear friends Yuval Halperin and Ayelet Ben, Ph.D. Brian Callaghan, and Ph.D. Meir Amor, that are affectionately called fellow semantic hacktivists who share the passion for language and its power to promote social and political change. This piece on running up semantic hills is dedicated to you, with gratitude for your inspiring work…


  • The Diffie-Hellman key exchange

    The Diffie-Hellman key exchange is a method for two parties to generate a shared secret key that can be used to encrypt their messages to each other. It uses mathematical calculations to generate the shared secret key, and the binary representation of the hidden numbers is not fixed and can be randomly chosen. To begin…


  • Protect Yourself Against Virally Loaded Hashtags: Understanding the Risks of Human DDoS Attacks

    In today’s digital age, social media has become a powerful tool for connecting with others and sharing information. However, it has also opened up new opportunities for malicious actors to spread misinformation and manipulate public opinion . One of the most concerning tactics attackers use is the human DDoS attack. The human DDoS attack. ,…


  • Neuropedagogy in the Digital Age

    One potential form of a social engineering attack is a human DDoS attack, which can use viral media to overload social media users with confusing and overwhelming content. Such an attack could be part of an influence operation in which malicious actors seek to manipulate public opinion and behavior. To counteract these attacks, strategies from…


  • How a Virally Loaded Hashtag Can Potentially Trigger a Human DDoS Attack

    Social media platforms have become a significant part of our daily lives . With the rise of social media, we also witness an increase in the potential for social engineering attacks. One such attack vector uses virally loaded hashtags to trigger a human DDoS attack. A virally loaded hashtag is a hashtag that has been…


  • Rap music and Linguistic hacktivism

    Rap music has long been a source of inspiration and motivation for linguistic hacktivists worldwide. Through its powerful lyrics and social commentary, rap has significantly promoted social and political change, challenging systemic oppression and injustice.] This blog post will explore the relationship between rap and linguistic hacktivism and examine how rappers have used their music…


  • protests against the broadcast of forced confessions on Iranian media

    “A semantic hacktivist protests against the broadcast of forced confessions on Iranian media, citing Robert Jay Lifton’s eight criteria for mind control and thought reform. This statement denounces this practice as violating human rights and calls for its immediate cessation.” As a semantic hacktivist, I strongly protest against the broadcast of forced confessions by the…


  • global digital peer support

    The concept of global digital peer support is based on the idea that individuals can benefit from supportive networks and communities, both online and offline, that can help to build their resilience, promote their well-being, and foster their sense of belonging and connection. This approach can provide individuals with access to various resources and information…


  • SEMantic overload for youth

    Today we’re talking about semantic overload , when we’re exposed to too much information that overwhelms our brains. We’re guilty of scrolling through our feeds for hours , but did you know it can harm our mental health? So, what can we do to combat semantic overload? Here are some practical tips: Remember, taking care…


  • chatgpt & DID/MPD

    Dissociative Identity Disorder (DID) is a complex mental health condition characterized by two or more distinct personality states within an individual. Individuals with DID may experience various symptoms, including memory loss, changes in behavior or mannerisms, and the presence of inner voices or dialogues. Managing the symptoms of DID can be challenging, especially regarding communication…


  • The star of defense method

    Our modern world is constantly bombarded with language and information from many sources. While this can be a valuable tool for knowledge and connection, it can also be a source of confusion, stress, and even manipulation . Combatting semantic terrorism, or the deliberate manipulation of language and meaning for malicious purposes, requires a critical and…


Month: February 2023