Volokh Conspiracy: What speech is going to justify expulsion next, if the OU / SAE expulsion is accepted as proper?

Two members of the Sigma Alpha Epsilon fraternity at the University of Oklahoma have been expelled for their role in video that showed members singing a racist chant. (AP)

University of Oklahoma President David Boren has expelled two students for leading a racist chant. These students speech was indeed quite repugnant, but for reasons I discuss here, its protected by the First Amendment.

And heres one reason why. Consider the presidents statement to the students: You will be expelled because of your leadership role in leading a racist and exclusionary chant which has created a hostile educational environment for others. Similar things could be said about a vast range of other speech.

Students talking to each other about a student group event about how Hamas has it right? (The Charter of Hamas, recall, expressly says, The Prophet, Allah bless him and grant him salvation, has said: The Day of Judgement will not come about until Moslems fight the Jews (killing the Jews), when the Jew will hide behind stones and trees. The stones and trees will say O Moslems, O Abdulla, there is a Jew behind me, come and kill him. Only the Gharkad tree, (evidently a certain kind of tree) would not do that because it is one of the trees of the Jews. (related by al-Bukhari and Moslem).) Why, that could be labeled leading an anti-Semitic and exclusionary discussion that, once its publicized on campus, creates a hostile educational environment for Jews.

Black students talking to each other about how all whites are racist, and white cops and maybe other whites should get shot? Again, that could be labeled racist and exclusionary speech that, when publicized, can create a hostile educational environment for whites.

Students talking about what a horrible, oppressive religion Islam is, or Scientology is, or Catholicism is, or conservative Christianity is, and how no-one should associate with people who have such evil religious views? Could be called religiously bigoted and exclusionary discussion that, when publicized, can create a hostile educational environment for members of that group. To be sure, this hypothetical doesnt include discussion of violence but president Boren seems to think that even this isnt required for expulsion, so long as the speech is bigoted and exclusionary. And the rhetoric of hostile educational environment, when it has been used to try to restrict speech on campuses, has never been limited to speech that mentions violence.

Likewise, students talking about how they think homosexuality is evil, and that homosexuals shouldnt get equal treatment? Could be called bigotry based on sexual orientation and exclusionary statements that, when publicized, can create a hostile educational environment for gays. Students talking about how women are inferior to men, or men are inferior to women same thing.

And I take it that open membership in groups including off-campus groups that espouse actually or allegedly racist, religiously bigoted, antigay, sexist, etc. views would be covered as well. Surely a students membership in the KKK, if other students learn about it, will lead them to infer that the student is racist just as much (if not more than) the singing of a racist song would. Likewise, a students membership in a group that endorses the Hamas Charter, a religious organization that harshly criticizes homosexuality, an organization that believes whites are inferior or morally corrupt, and so on.

There is, as Ive mentioned before, no First Amendment exception for supposed hate speech. But if there is such an exception, there certainly is no First Amendment foundation for distinguishing speech that is actually or supposedly anti-black from speech that is anti-white, anti-Semitic, anti-Muslim, anti-Catholic, anti-women, or anti-men. If the University of Oklahoma presidents position is accepted as legally sound, then thered be no legal basis for protecting the other kinds of speech while expelling students for this sort of speech.

And what I call censorship envy will make it all the more likely that there will indeed be calls for expelling students who express those other views. Right now, for instance, Jewish students who have to deal with their classmates holding anti-Semitic views, and expressing them to each other, may rightly assume that such speech is protected by the First Amendment and the university cant expel the anti-Semites. But if it becomes accepted that a university can expel people who express racist views about blacks, why wouldnt many Jewish students call for expulsion of students who express (even just to each other) anti-Semitic views? Indeed, many students might think that they would be chumps for failing to demand such expulsion, after theyve been taught that such speech victimizes them by creating a hostile educational environment that can be remedied by expelling bigoted students. And thats just one example.

Read this article:

Volokh Conspiracy: What speech is going to justify expulsion next, if the OU / SAE expulsion is accepted as proper?

Cebit 2015: Saarland computer scientists present guarantees for online anonymity

IMAGE:Sebastian Meiser and Esfandiar Mohammadi provide guarantees of users' anonymity within the Tor network. view more

Credit: Oliver Dietze

This news release is available in German.

Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example. Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services. One of the most popular tools is Tor. Since the beginning of the year, alone more than two million users have used it to anonymize their Internet connection data. These services will not only conceal browsing behavior, but also the identity of the user, and that of any other recipients. These will usually be other websites, but could also be another person. Tor works in a way that allows users to establish a connection that is then upheld through its own network. The Tor network comprises up to 6,000 servers, mostly run by volunteers, which computer scientists refer to as "nodes". And since every node only receives the minimal amount of data necessary to relay the information in question, it becomes far more difficult to de-anonymize both the transmitter and the recipient of the data.

"The Tor network isn't perfect, however," says Esfandiar Mohammadi, a researcher at the Research Center for IT Security, CISPA, and a doctoral candidate at the Graduate School for Computer Science in Saarbrcken. "For one, unanticipated attacks at a network level can endanger anonymity. Also, the degree of anonymity the network achieves is highly variable, since volunteers don't necessarily operate their nodes continually or regularly," says Mohammadi.

In collaboration with CISPA researcher Sebastian Meiser, who is also a postgraduate at the Saarbrcken Graduate School for Computer Science, Mohammadi developed a program that can provide an accurate assessment of the level of anonymity an individual user achieves, even while basing the estimate on the fluctuations of the Tor network. According to the researchers, this feature is a worldwide first.

"An attacker that compromises Tor servers can derive the identity of a user with a certain probability. This is exactly what our system calculates," Sebastian Meiser explains. The two Saarbrcken researchers based their technique, which they named "MATor", on a mathematical model that they extended to include different categories of possible attacks. "In order to indicate the probability of de-anonymization, our program performs its calculations using data that is aggregated once an hour and published on the network immediately. MATor also takes the specifics of the respective Internet connection into account, as well as the individual configurations of the Tor software," Meiser says. This feature is also intended as a basis for a so-called plugin, a small extension program for the software "Tor Browser" that the researchers now want to develop. Integrated into the Tor software, this could run in the background and simply notify users as soon as their connection became too unsafe.

Computer science and informatics at Saarland University

The Department of Computer Science forms the core of the informatics landscape at Saarland University. A further seven internationally renowned research institutes are located in the immediate vicinity on campus. As well as the two Max Planck Institutes for Informatics and for Software Systems, the Saarbrcken campus is also home to the German Research Center for Artificial Intelligence, the Intel Visual Computing Institute, the Center for IT Security, Privacy and Accountability (CISPA) and the Cluster of Excellence 'Multimodal Computing and Interaction'.

###

Excerpt from:

Cebit 2015: Saarland computer scientists present guarantees for online anonymity

Guarantees for online anonymity?

Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example. Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services.

One of the most popular tools is Tor. Since the beginning of the year, alone more than two million users have used it to anonymize their Internet connection data. These services will not only conceal browsing behavior, but also the identity of the user, and that of any other recipients. These will usually be other websites, but could also be another person. Tor works in a way that allows users to establish a connection that is then upheld through its own network. The Tor network comprises up to 6,000 servers, mostly run by volunteers, which computer scientists refer to as "nodes." And since every node only receives the minimal amount of data necessary to relay the information in question, it becomes far more difficult to de-anonymize both the transmitter and the recipient of the data.

"The Tor network isn't perfect, however," says Esfandiar Mohammadi, a researcher at the Research Center for IT Security, CISPA, and a doctoral candidate at the Graduate School for Computer Science in Saarbrcken. "For one, unanticipated attacks at a network level can endanger anonymity. Also, the degree of anonymity the network achieves is highly variable, since volunteers don't necessarily operate their nodes continually or regularly," says Mohammadi.

In collaboration with CISPA researcher Sebastian Meiser, who is also a postgraduate at the Saarbrcken Graduate School for Computer Science, Mohammadi developed a program that can provide an accurate assessment of the level of anonymity an individual user achieves, even while basing the estimate on the fluctuations of the Tor network. According to the researchers, this feature is a worldwide first.

"An attacker that compromises Tor servers can derive the identity of a user with a certain probability. This is exactly what our system calculates," Sebastian Meiser explains. The two Saarbrcken researchers based their technique, which they named "MATor," on a mathematical model that they extended to include different categories of possible attacks. "In order to indicate the probability of de-anonymization, our program performs its calculations using data that is aggregated once an hour and published on the network immediately. MATor also takes the specifics of the respective Internet connection into account, as well as the individual configurations of the Tor software," Meiser says. This feature is also intended as a basis for a so-called plugin, a small extension program for the software "Tor Browser" that the researchers now want to develop. Integrated into the Tor software, this could run in the background and simply notify users as soon as their connection became too unsafe.

Story Source:

The above story is based on materials provided by University Saarland. Note: Materials may be edited for content and length.

Read more here:

Guarantees for online anonymity?

Find hidden data on your computer with PCFerret

How well do you know your PC, the data it holds, how its really being used by others? PCFerret is a freeware tool for Windows Vista and later which claims it can help you find out.

Despite the intriguing pitch, PCFerret opens with a relatively ordinary system information report. It covers the core details youd expect -- hardware, network, drive statistics, user accounts etc -- and can be saved to HTML for easy sharing, but it cant compete with the more specialist competition.

The "Browser Media" tool is more interesting, scanning your browser caches (Firefox, Chrome, IE, Opera. Safari, Sea Monkey) for images or movies, then displaying thumbnails of the results. Could be useful for checking what others are viewing online.

A similar "Cached URLs" module checks your browser caches, and raises alerts for any URLs which contain suspect keywords. We found this raised lots of false alarms (hint: "pov" isnt just used in porn) but you can at least customize the keyword list, hopefully making it more accurate.

The Find Files By Type function is a highlight, scanning your PC and reporting on files whose content doesnt match their file extension. If someone has downloaded videos and renamed them to have a ZIP or ISO extension, say, this module should raise the alert. You could use it to detect encrypted containers, and for many other purposes, for example detecting malicious executable code which has been disguised as something else.

Theres a similar security tool in the programs "ADS Selection" feature, which scans your system to report on files with alternate data streams.

Bonus extras include a secure password creator, a file hash generator, a Tor Browser detector, and a module for managing Windows reboot operations (deleting, moving or renaming files when your system restarts).

PCFerret is an odd mix of features. It feels like the developer knows most of the individual modules arent quite as good as the best of the freeware competition, but instead of improving them, hes just bolted on something else.

But, we still think its worth downloading for the "Find Files By Type" module alone. This gives you much more control than similar programs, and makes it easy to find archives, images, hidden scripts, Registry files and more.

More:

Find hidden data on your computer with PCFerret

Inside the secretive world of a Chinese bitcoin mine

Bitcoin, the world's leading cryptocurrency, has had a roller coaster ride over the past 12 months.

Despite wild fluctuations in the exchange rate, scams galore and the involvement of many a shady character, the process of mining is still a lucrative exercise.

This documentary, produced by Vice, gives a rare glimpse inside a Chinese bitcoin mine. Situated in northeastern Liaoning province, the mine turns over $US1.5 million worth of bitcoin a month.

Advertisement

What is a cryptocurrency?

A cryptocurrency is a digital medium of exchange that uses encrypted software to operate a market for transactions. That market is overseen by those using the network, based on rules coded in to algorithms. It's a transparent, peer-to-peer operation, similar to the file-sharing protocol BitTorrent which is widely used for the illegal sharing of movies, TV shows and music.

How are cryptocurrencies propagated?

Cryptocurrencies are created, or mined, based on a mathematical formula. In the mining process, computers are tasked to solve complex mathematical problems and rewarded with virtual coinage. Over time, the equations become progressively more difficult to solve, slowing down the supply of new cryptocurrency units.

Can anyone become a miner?

Theoretically it is possible to start mining at home. But as the mathematical challenge becomes harder, more computational grunt is required. For this reason, miners often pool resources to buy access to supercomputers or server farms (networked arrays of smaller computers).

The rest is here:

Inside the secretive world of a Chinese bitcoin mine

My Big Coin Pay, Inc. Announces Letter of Intent to Merge With Shot Spirits Corporation

SOURCE: My Big Coin Pay, Inc.

LAS VEGAS, NV--(Marketwired - Mar 3, 2015) - Privately held My Big Coin Pay, the corporate parent of the online cryptocurrency payment platform and virtual wallet website http://www.MyBigCoin.com, announced today that it has entered into a letter of intent to merge with Shot Spirits Corporation (OTC PINK: SSPT), as part of an alternative public offering or "APO" transaction. Subject to regulatory approval and the fulfillment of contractual obligations, if successful, the merged company will be named My Big Coin Pay and is expected to trade on the OTC Pink Marketplace. The current management of My Big Coin Pay will become the management of the surviving public entity.

According to the Letter of Intent, My Big Coin Pay has thirty (30) days to complete the contemplated merger. My Big Coin Pay must, according to the Letter of Intent, work with Shot Spirits Corporation to provide "current public information" through the OTC Pink Marketplace and obtain the necessary regulatory approvals for the merger. The Letter of Intent further contemplates that a definitive agreement with respect to the contemplated merger must be executed within thirty (30) days. The contemplated definitive agreement, subject to revision, provides that upon completion of the merger, the shareholders of My Big Coin Pay will own approximately 90% of the common stock of the surviving entity, while the shareholders of Shot Spirits will own approximately ten (10%).

John Roche, Chief Executive Officer of My Big Coin Pay, said, "This Letter of Intent marks a significant step in the process of becoming a publicly held company." He added, "My Big Coin Pay is another step closer to being accessible within the micro cap public market, and creating an opportunity for investors to get involved in what we believe is an exciting, emerging technology that seeks to create a viable commercial platform for cryptocurrencies. We will be focusing all of our efforts over the next 30 days on meeting our obligations to close this transaction." The execution of a definitive agreement and closing of the merger is targeted for late March, 2015, subject to customary closing conditions, regulatory approval as well as shareholder approval from both companies.

About My Big Coin Pay, Inc.

My Big Coin Pay, Inc. is the corporate parent of the online cryptocurrency payment platform and virtual wallet website http://www.MyBigCoin.com. MyBigCoin is a privacy-centered digital currency developed for use with My Big Coin Pay's emerging peer-to-peer and commercial digital currency exchange platforms. My Big Coin Pay seeks to collaborate with payments industry leaders to develop unique, high-value, cryptocurrency-based payment solutions. My Big Coin Pay, Inc. is a privately-held company based in Las Vegas, Nevada.

Statements in this press release that are not historical fact may be deemed forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Although My Big Coin Pay, Inc. believes the expectations reflected in any forward-looking statements are based on reasonable assumptions, My Big Coin Pay is unable to give any assurance that its expectations will be attained. Factors that could cause actual results to differ materially from expectations include the company's ability meet the conditions necessary to complete the proposed APO transaction.

Continued here:

My Big Coin Pay, Inc. Announces Letter of Intent to Merge With Shot Spirits Corporation

Feeding the Homeless With Bitcoin Again For The Fifth Time in Montreal, Canada – Video


Feeding the Homeless With Bitcoin Again For The Fifth Time in Montreal, Canada
This is my 5th video just recorded tonight of me feeding homeless people in Montreal, Canada. I Bought Starbucks Coffee and a lot of Burgers at Mcdonalds and paid for it all with Bitcoin to...

By: Adam Guerbuez

View post:

Feeding the Homeless With Bitcoin Again For The Fifth Time in Montreal, Canada - Video

Auto Touch ultility for ios/android devices – Tap Titans/Bitcoin Billionaires – Mobile Game Tut. – Video


Auto Touch ultility for ios/android devices - Tap Titans/Bitcoin Billionaires - Mobile Game Tut.
Auto Touch Ultility for ios/android devices - AutoTouch is used to record and playback your operations in your mobile devices - Mobile Game Tut Blog MobileGameTut: http://adf.ly/15V1u2 MobileGam...

By: MobileGame Tut

More:

Auto Touch ultility for ios/android devices - Tap Titans/Bitcoin Billionaires - Mobile Game Tut. - Video

Bitcoin Affiliate Network playing ‘Daddy Cool’ after breaking a block, and 6 monitor desktop. – Video


Bitcoin Affiliate Network playing #39;Daddy Cool #39; after breaking a block, and 6 monitor desktop.
Just wanted to share this little bit of silliness I found the other day and had a chance to record today. A mining pool I mine on plays Daddy Cool by Boney M whenever they break a block. Pretty...

By: Glytch

Visit link:

Bitcoin Affiliate Network playing 'Daddy Cool' after breaking a block, and 6 monitor desktop. - Video

VanosEnigmA 096 Phoenix World Currency MarkOfTheBeast RFID Bibel Prophecy InnerEarth SciFi Bitcoin – Video


VanosEnigmA 096 Phoenix World Currency MarkOfTheBeast RFID Bibel Prophecy InnerEarth SciFi Bitcoin
http://www.twitter.com/VanosEnigmA http://www.facebook.com/VanosEnigma http://www.twitter.com/CryptoEEV Thank you mucho meow for your donation: Bitcoin Address: 1FJ9ZZcnKqhiiYWNhbpBaqy9QQHTBSmsP8 ...

By: VanosEnigmA Enigmaisland

Go here to see the original:

VanosEnigmA 096 Phoenix World Currency MarkOfTheBeast RFID Bibel Prophecy InnerEarth SciFi Bitcoin - Video

Bitcoin 101 – A Million Killer Apps – Part 2 – Blockchains & A Global Shared History – Video


Bitcoin 101 - A Million Killer Apps - Part 2 - Blockchains A Global Shared History
History has always been written by the victors. But beginning in 2009, this limitation has been disrupted. Designed to be electronic cash, Bitcoin has proved to be so much more. In this video...

By: world bitcoin network

Read more from the original source:

Bitcoin 101 - A Million Killer Apps - Part 2 - Blockchains & A Global Shared History - Video