skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Learning through the grapevine and the impact of the breadth and depth of social networks
We study how communication platforms can improve social learning without censoring or fact-checking messages, when they have members who deliberately and/or inadvertently distort information. Message fidelity depends on social network depth (how many times information can be relayed) and breadth (the number of others with whom a typical user shares information). We characterize how the expected number of true minus false messages depends on breadth and depth of the network and the noise structure. Message fidelity can be improved by capping depth or, if that is not possible, limiting breadth, e.g., by capping the number of people to whom someone can forward a given message. Although caps reduce total communication, they increase the fraction of received messages that have traveled shorter distances and have had less opportunity to be altered, thereby increasing the signal-to-noise ratio.  more » « less
Award ID(s):
2018554
PAR ID:
10432617
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
Proceedings of the National Academy of Sciences
Volume:
119
Issue:
34
ISSN:
0027-8424
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. This paper explores the structural characteristics of information dissemination on WhatsApp, focusing particularly on the concepts of "breadth" and "depth." "Breadth" refers to the maximum number of groups to which a message is simultaneously forwarded, while "depth" indicates the maximum number of times a message is forwarded. Using a dataset from 1,600 groups in India comprising over 760,000 messages spanning text, images, and videos, this study employs hashing techniques to track message propagation in a privacy-preserving manner. Analysis of cascade size, breadth, and depth reveals significant trends: text and video messages tend to generate larger cascade sizes compared to images. Contrary to public platforms, depth emerges as the primary driver behind widespread information dissemination (which could be due to WhatsApp's limitations on message broadcasts). Additionally, distinct disparities among message types show depth as the decisive factor in text and video cascades, while both breadth and depth significantly contribute to image cascades. These findings underscore the importance of considering structural nuances in understanding information spread dynamics on private messaging platforms, providing valuable insights for effective dissemination strategies and management in digital communication landscapes. 
    more » « less
  2. A framework is presented for understanding how misinformation shapes decision-making, which has cognitive representations of gist at its core. I discuss how the framework goes beyond prior work, and how it can be implemented so that valid scientific messages are more likely to be effective, remembered, and shared through social media, while misinformation is resisted. The distinction between mental representations of the rote facts of a message—its verbatim representation—and its gist explains several paradoxes, including the frequent disconnect between knowing facts and, yet, making decisions that seem contrary to those facts. Decision makers can falsely remember the gist as seen or heard even when they remember verbatim facts. Indeed, misinformation can be more compelling than information when it provides an interpretation of reality that makes better sense than the facts. Consequently, for many issues, scientific information and misinformation are in a battle for the gist. A fuzzy-processing preference for simple gist explains expectations for antibiotics, the spread of misinformation about vaccination, and responses to messages about global warming, nuclear proliferation, and natural disasters. The gist, which reflects knowledge and experience, induces emotions and brings to mind social values. However, changing mental representations is not sufficient by itself; gist representations must be connected to values. The policy choice is not simply between constraining behavior or persuasion—there is another option. Science communication needs to shift from an emphasis on disseminating rote facts to achieving insight, retaining its integrity but without shying away from emotions and values. 
    more » « less
  3. Metadata from voice calls, such as the knowledge of who is communicating with whom, contains rich information about people’s lives. Indeed, it is a prime target for powerful adversaries such as nation states. Existing systems that hide voice call metadata either require trusted intermediaries in the network or scale to only tens of users. This paper describes the design, implementation, and evaluation of Addra, the first system for voice communication that hides metadata over fully untrusted infrastructure and scales to tens of thousands of users. At a high level, Addra follows a template in which callers and callees deposit and retrieve messages from private mailboxes hosted at an untrusted server. However, Addra improves message latency in this architecture, which is a key performance metric for voice calls. First, it enables a caller to push a message to a callee in two hops, using a new way of assigning mailboxes to users that resembles how a post office assigns PO boxes to its customers. Second, it innovates on the underlying cryptographic machinery and constructs a new private information retrieval scheme, FastPIR, that reduces the time to process oblivious access requests for mailboxes. An evaluation of Addra on a cluster of 80 machines on AWS demonstrates that it can serve 32K users with a 99-th percentile message latency of 726 ms—a 7✕ improvement over a prior system for text messaging in the same threat model. 
    more » « less
  4. null (Ed.)
    The resource-constrained nature of the Internet of Things (IoT) edges, poses a challenge in designing a secure and high-performance communication for this family of devices. Although side-channel resistant ciphers (either block or stream) could guarantee the security of the communication, the energy intensive nature of these ciphers makes them undesirable for lightweight IoT solutions. In this paper, we introduce ExTru, an encrypted communication protocol based on stream ciphers that adds a configurable switching & toggling network (CSTN) to not only boost the performance of the communication in these devices, it also consumes far less energy than the conventional side-channel resistant ciphers. Although the overall structure of the proposed scheme is leaky against physical attacks, we introduce a dynamic encryption mechanism that removes this vulnerability. We demonstrate how each communicated message in the proposed scheme reduces the level of trust. Accordingly, since a specific number of messages, N, could break the communication and extract the key, by using the dynamic encryption mechanism, ExTru can re-initiate the level of trust periodically after T messages where T <; N, to protect the communication against side-channel and scan-based attacks (e.g. SAT attack). Furthermore, we demonstrate that by properly configuring the value of T, ExTru not only increases the strength of security from per “device” to per “message”, it also significantly improves energy saving as well as throughput vs. an architecture that only uses a conventional side-channel resistant block/stream cipher. 
    more » « less
  5. Abstract When type inference fails, it is often difficult to pinpoint the cause of the type error among many potential candidates. Generating informative messages to remove the type error is another difficult task due to the limited availability of type information. Over the last three decades many approaches have been developed to help debug type errors. However, most of these methods suffer from one or more of the following problems: (1) Being incomplete, they miss the real cause. (2) They cover many potential causes without distinguishing them. (3) They provide little or no information for how to remove the type error. Any one of this problems can turn the type-error debugging process into a tedious and ineffective endeavor. To address this issue, we have developed a method named counter-factual typing , which (1) finds a comprehensive set of error causes in AST leaves, (2) computes an informative message on how to get rid of the type error for each error cause, and (3) ranks all messages and iteratively presents the message for the most likely error cause. The biggest technical challenge is the efficient generation of all error messages, which seems to be exponential in the size of the expression. We address this challenge by employing the idea of variational typing that systematically reuses computations for shared parts and generates all messages by typing the whole ill-typed expression only once. We have evaluated our approach over a large set of examples collected from previous publications in the literature. The evaluation result shows that our approach outperforms previous approaches and is computationally feasible. 
    more » « less