• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Fake news is everywhere. Should the tech world help stop the spread?

November 26, 2016 by Roberto Nogueda 1 Comment

Programmers step up

Post-election, things have finally started to change. Nabanita De attended a hackathon at Princeton University and, with three fellow programmers, developed an algorithm that authenticates what is real and what is fake on Facebook. They call this tool FiB.

This algorithm soon turned into a Google Chrome Extension that scans through your Facebook feed, in real time, and this is what I found on their website.

Our algorithm is twofold, as follows:

Content-consumption: Our chrome-extension goes through your Facebook feed in real time as you browse it and verifies the authenticity of posts. These posts can be status updates, images or links. Our back-end AI checks the facts within these posts and verifies them using image recognition, keyword extraction, and source verification and a twitter search to verify if a screenshot of a twitter update posted is authentic. The posts then are visually tagged on the top right corner in accordance with their trust score. If a post is found to be false, the AI tries to find the truth and shows it to you.

Content-creation: Each time a user posts/shares content, our chat bot uses a webhook to get a call. This chat bot then uses the same backend AI as content consumption to determine if the new post by the user contains any unverified information. If so, the user is notified and can choose to either take it down or let it exist.

https://devpost.com/software/fib

Fake news is everywhere. Should the tech world help stop the spread?

Filed Under: Week 07: NetCat and HellCat Tagged With:

Reader Interactions

Comments

  1. Arkadiy Kantor says

    November 30, 2016 at 1:04 pm

    Why such a high tech solution? It should be as simple as creating a “gray list” of websites that publish fake news. A way to flag or vote for websites as being “fake” should be a really way to manage this. Also let users opt in/out of seeing the fake news, that way everyone is happy? What do you think?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in