Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/31/2009
05:34 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Wikipedia Considers Coloring Untested Text

Registered Wikipedia users may soon have access to software that colors text deemed untrustworthy.

In an effort to enhance the reliability of Wikipedia content, the WikiMedia Foundation, which oversees Wikipedia, is weighing whether to offer an opt-in tool for registered users that colors untrustworthy text.

The software, WikiTrust, is available as an extension to the MediaWiki platform, upon which Wikipedia runs. It's a project developed by UC Santa Cruz professor Luca de Alfaro, and computer science grad students B. Thomas Adler and Ian Pye.

Reached in Buenos Aires, where Wikimania 2009 has just wrapped up, de Alfaro says that the timing of an experimental trial remains under discussion. The purpose of the trial, he says, will be to gather community feedback about the utility of the tool.

Despite its name, WikiTrust can't directly measure whether text is trustworthy. "It can only measure user agreement," said de Alfaro. "That's what it does."

Wikipedia remains a target for vandals, pranksters, and anyone with a motive to manipulate entries. The online encyclopedia's community of editors is constantly on the lookout for accidental and deliberate changes that introduce bias to articles.

In an e-mail, Jay Walsh, head of communications for the WikiMedia Foundation, says that the WikiTrust code is being reviewed by the organization's technology team and that the timing of a trial, if it happens, has not been determined.

"The Foundation is looking at a number of quality/rating tools for Wikipedia content, and for our other projects," he explained in an e-mail. "Many are as simple as 'rate this article' features, and some, like WikiTrust are experimental and more unique in their ability to examine other data to render some context on the article. In all cases we will deeply consult with our community of developers and editors before implementing any technology."

While users may make trust decisions based WikiTrust, de Alfaro said that the software should also be useful as an anti-vandalism tool.

Vetting Wikipedia content for reliability could enhance scholarly acceptance of the online encyclopedia. De Alfaro says that he expects WikiTrust will be used to help identify reliable content for distribution to schools.

"It's always frowned upon to use Wikipedia as something you cite because the content is variable," he said.

Register for Interop New York and gain a complete understanding of the most important innovations in Interop's comprehensive conference and expo, where you'll see the full range of IT solutions to position your organization for growth. At the Jacob Javits Center, Nov. 16-20, 2009. Find out more and register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32823
PUBLISHED: 2021-06-24
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with &lt...
CVE-2021-35041
PUBLISHED: 2021-06-24
The blockchain node in FISCO-BCOS V2.7.2 may have a bug when dealing with unformatted packet and lead to a crash. A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainabl...
CVE-2021-2322
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
CVE-2021-20019
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
CVE-2021-21809
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.