Vote for DecisionStats logo

old logoOld Logo

 

New Logo

logo ds

Vote for Logo

Trolling Behavior on StackOverflow

I have asked a question on Stack Overflow based on discussions between myself and a few others members of Delhi Data Science groups

http://meta.stackoverflow.com/q/296887/447537

How do we report trolling behavior, bullying or harassment in terms of constant and targeted down voting?

I have sometimes noticed trolling behavior by a group of people, they are fairly highly ranked in terms of reputation, but have abysmal manners in terms of snark, group down-voting as well as targeted down-voting.

How do i report such behavior?

Does Stack Overflow have any remedy for small and new users targeted by high reputation users ?

a lovely tool for Data Explorer in Stack Overflow

http://data.stackexchange.com/stackoverflow/query/25355/have-we-met

 

Have we met?

Where have I ‘met’ another user? (Reminder, Jon Skeet’s user id is 22656 :) May throw up some false positives because of @Name matches.
- Have we met?
-- Where have I 'met' another user? (Reminder, Jon Skeet's user id is 22656 :) May throw up some false positives because of @Name matches.

declare @MyId int = ##MyId##;
declare @TheirId int = ##TheirId##;

declare @LikeMyName nvarchar(40)
select @LikeMyName = '%' + DisplayName + '%' from Users where Id = @MyId

declare @TheirName nvarchar(40)
declare @LikeTheirName nvarchar(40)
select @TheirName = DisplayName from Users where Id = @TheirId
select @LikeTheirName = '%' + @TheirName + '%'

-- Question/Answer meetings
  select
   Questions.Id as [Post Link],  
    case
      when Questions.OwnerUserId = @TheirId then @TheirName + '''s question, my answer'
    else 'My question, ' + @TheirName + '''s answer'
    end as [What]
  from Posts as Questions
  inner join Posts as Answers
   on Questions.Id = Answers.ParentId
  where Answers.PostTypeId = 2 and Questions.PostTypeId = 1
   and ((Questions.OwnerUserId = @TheirId and Answers.OwnerUserId = @MyId )
     or (Questions.OwnerUserid = @MyId and Answers.OwnerUserId = @TheirId ))
union
  -- Comments on owned posts
  select Posts.Id as [Post Link],
    case
      when Posts.PostTypeId = 1 and Posts.OwnerUserId = @TheirId then @TheirName + '''s question, my comment'
      when Posts.PostTypeId = 1 and Posts.OwnerUserId = @MyId then 'My question, ' + @TheirName + '''s comment'
      when Posts.PostTypeId = 2 and Posts.OwnerUserId = @TheirId then @TheirName + '''s answer, my comment'
      when Posts.PostTypeId = 2 and Posts.OwnerUserId = @MyId then 'My answer, ' + @TheirName + '''s comment'
    end as [What]  
  from Posts
  inner join Comments
    on Posts.Id = Comments.PostId
  where ((Posts.OwnerUserId = @TheirId and Comments.UserId = @MyId )
     or (Posts.OwnerUserid = @MyId and Comments.UserId = @TheirId ))

union
 -- @comments on posts
  select Posts.Id as [Post Link],
    case
      when UserId = @TheirId then @TheirName + '''s reply to my comment'
      when UserId = @MyId then 'My reply to ' + @TheirName + '''s comment'
    end as [What]  
  from Comments
    inner join Posts on Comments.PostId = Posts.Id
  where ((UserId = @TheirId and Text like @LikeMyName )
     or (UserId = @MyId and Text like @LikeTheirName))

order by [Post Link]

Random Thoughts on Cryptography

Some random thoughts while taking a walk in the park-az1

1) The inevitability of interception- Sooner or later, encrypted messages will be captured.

2) The cost of decryption- Decryption is inevitable. All the coder can do is increase the cost (time, money and computation) to the enemy

3) Signal/Noise- Introducing multiple algorithms to create random noise messages can increase the cost of decryption but reduce the probability of interception.  The technologically weaker player should introduce more noise to distort the signal/noise ratio knowing the messages are being intercepted anyways ( especially electronic, radio or digital)

4) Intercepted flag- Interception takes time. Flags to capture interception shall help coders in knowing which messages have been intercepted and which not. This of course can be manipulated by the interceptor.

5) Turing is not God- You can use pictures, use Navajo slang, poetry code in the same message. Maybe change the code from binary to something else.cryptography

6) Kill all the decryptographers- Focusing on the personnel of the enemy can help increase the cost of decryption.

(yawns and shrugs)