104 Matching Annotations
  1. Jul 2022
    1. What is so maddening is that there are alternatives. There is an abundance of theory and arguments that could lead the way. The latest IPCC report had an entire section that doesn’t propose technofixes but instead explores how energy demand could be managed to ensure that everyone has enough to thrive while ensuring the biosphere doesn’t die. 

      IPCC AR6 WG III chapter 5: Demand, services and social aspects of mitigation https://hyp.is/go?url=https%3A%2F%2Freport.ipcc.ch%2Far6wg3%2Fpdf%2FIPCC_AR6_WGIII_FinalDraft_Chapter05.pdf&group=world

    1. Chapter 5: Demand, services and social aspects of mitigation

      Public Annotation of IPCC Report AR6 Climate Change 2022 Mitigation of Climate Change WGIII Chapter 5: Demand, Services and Social Aspects of Mitigation

      NOTE: Permission given by one of the lead authors, Felix Creutzig to annotate with caveat that there may be minor changes in the final version.

      This annotation explores the potential of mass mobilization of citizens and the commons to effect dramatic demand side reductions. It leverages the potential agency of the public to play a critical role in rapid decarbonization.

  2. Jun 2022
    1. the inter-connectedness of the crises we face climate pollution biodiversity and 00:07:54 inequality require our change require a change in our exploitative relationship to our planet to a more holistic and caring one but that can only happen with a change in our behavior

      As per IPCC AR6 WGIII, Chapter 5 outlining for the first time, the enormous mitigation potential of social aspects of mitigation - such as behavioral change - can add up to 40 percent of mitigation. And also harkening back to Donella Meadows' leverage points that point out shifts in worldviews, paradigms and value systems are the most powerful leverage points in system change.

      Stop Reset Go advocates humanity builds an open source, open access praxis for Deep Humanity, understand the depths of what it means to be a living and dying human being in the context of an entwined culture. Sharing best practices and constantly crowdsourcing the universal and salient aspects of our common humanity can help rapidly transform the inner space of each human INTERbeing, which can powerfully influence outer (social) transformation.

  3. May 2022
    1. The hyper-response aims to deflate or attack the hyperthreat by operating at the microlevel through “mesh-interventions” as well as at the macrolevel through realignment of great nation states and tribes.

      In IPCC AR6 WGIII Parlence, middle actors can mediate a community scale change, which becomes a force multiplier for individual change. Supercharging individual change is what can lead to significant scale of impact through many and many types of mesh interventions. The scale of such mesh interventions will have a "trickle up" effect to affect and accelerate the actions of top down actors.

      This would be truly empowering as the current agency of the individual at the grassroots level is ineffectual.

      Stop Reset Go (SRG) s a simple but powerful meme that is designed to be used by anyone to effect transition. When we recognize that something is harmful and needs to change, SRG can be invoked as a simple rule for transition. The colors of the traffic light are used as a mnemonic aid. If there is a problem with a human process, then STOP. think of an alternative way of achieving the same goal that does not bring about the harm (RESET). When the alternative has been trialed, tested and proven to work without causing more progress traps, then find a way to scale and implement the solution (GO).

      SRG therefore becomes a simple mesh intervention that can be applied at all scales and dimensions. Its iterative and recursive use can be tracked in the Indyweb and interventions can be modeled by AI assistants that can analyze for potential unintended consequences through connections outside the focus area of the designer, and not normally explored by the designers. This augers a truly circular design methodology of the lowest potential impact.

    2. “low-hanging fruit”

      IPCC AR6 WGIII Chapter 5: demand, services and social aspects of mitigation identifies that up to 45% of mitigation can result from a demand-side socialization strategy and collective action mobilization. This gives us tremendous power of impact to mobilize people. The low hanging fruit can be identified by comprehensive, ongoing, deep, global conversations with the greatest diversity of actors with a common vision collectively searching for the social tipping points, leverage points and idling resources and scaling massively thru the Indyweb as a cosmolocal network (what's light we share, what's heavy we produce locally).

      Climate scientist and realist Professor Kevin Anderson has argued for many years that demand side changes are the only solutions that can be implemented rapidly enough to peak emissions and drop emissions rapidly in the short term (next few years), buying time for reneewable energy solutions to scale globally.

    3. An analysis of “friendly forces” via a “tribal discourse” activity found that although many of humanity’s smaller and less powerful tribes are engaged in minor operations against the hyperthreat, its most powerful tribes often abet the hyperthreat (figure 2). If humanity’s tribes could be united against the hyperthreat, the current balance of probabilities, which currently lie with a hyperthreat victory and a Hothouse Earth outcome, could be recast.

      This is the key idea behind mobilizing an effective global, multi-stakeholder, bottom-up response. Minor operations implies an aggregate approach that has little impact, otherwise known colloquially as "tinkering at the edge". IPCC AR6, WGIII Chapter 5 articulates this same message and for the first time, outlines that demand side system changes can play a significant role in mitigation effectiveness against the hyperthreat. It must be collectively organized individual change that scales to community scales around the globe in order to have impact, leveraging what the IPCC call "middle actors".

      An effective strategy must be very time sensitive to the short time window to peak emissions so must identify all leverage points, idling resources and social tipping points available to a global bottom-up mobilization.

  4. Apr 2022
    1. Another Angry Woman. (2022, January 1). A reminder that sometimes “living with it” means taking some mitigations, forever, e.g. How in order to live with cholera we make sure our water doesn’t have shit in it by building infrastructure to make sure our water doesn’t have shit in it. [Tweet]. @stavvers. https://twitter.com/stavvers/status/1477362596097536018

  5. Mar 2022
  6. Feb 2022
  7. Jan 2022
  8. Dec 2021
  9. Nov 2021
  10. Oct 2021
    1. Meuris, C., Kremer, C., Geerinck, A., Locquet, M., Bruyère, O., Defêche, J., Meex, C., Hayette, M.-P., Duchene, L., Dellot, P., Azarzar, S., Maréchal, N., Sauvage, A.-S., Frippiat, F., Giot, J.-B., Léonard, P., Fombellida, K., Moutschen, M., Durkin, K., … Darcis, G. (2021). Transmission of SARS-CoV-2 After COVID-19 Screening and Mitigation Measures for Primary School Children Attending School in Liège, Belgium. JAMA Network Open, 4(10), e2128757. https://doi.org/10.1001/jamanetworkopen.2021.28757

  11. Sep 2021
  12. Jun 2021
    1. However, the cookie containing the CSRF-TOKEN is only used by the client to set the X-XSRF-TOKEN header. So passing a compromised CSRF-TOKEN cookie to the Rails app won't have any negative effect.
    2. In short: storing the token in HttpOnly cookies mitigates XSS being used to get the token, but opens you up to CSRF, while the reverse is true for storing the token in localStorage.
  13. May 2021
    1. the majority of XSS attacks target theft of session cookies. A server could help mitigate this issue by setting the HttpOnly flag on a cookie it creates, indicating the cookie should not be accessible on the client.
    1. The NoScript extension for Firefox mitigates CSRF threats by distinguishing trusted from untrusted sites, and removing authentication & payloads from POST requests sent by untrusted sites to trusted ones. The Application Boundary Enforcer module in NoScript also blocks requests sent from internet pages to local sites (e.g. localhost), preventing CSRF attacks on local services (such as uTorrent) or routers.
  14. Mar 2021
  15. Dec 2020
  16. Oct 2020
    1. That is certainly a good use-case. One thing you can do is to require something other than a user-chosen string as a username, something like an email address, which should be unique. Another thing you could do, and I admit this is not user-friendly at all, to let them sign up with that user name, but send the user an email letting them know that the username is already used. It still indicates a valid username, but adds a lot of overhead to the process of enumeration.
    1. Landi, F., Marzetti, E., Sanguinetti, M., Ciciarello, F., Tritto, M., Benvenuto, F., Bramato, G., Brandi, V., Carfì, A., D’Angelo, E., Fusco, D., Lo Monaco, M. R., Martone, A. M., Pagano, F., Rocchi, S., Rota, E., Russo, A., Salerno, A., Cattani, P., … Bernabei, on behalf of the G. A. C.-19 G. T. (n.d.). Should face masks be worn to contain the spread of COVID-19 in the postlockdown phase? Transactions of The Royal Society of Tropical Medicine and Hygiene. https://doi.org/10.1093/trstmh/traa085

  17. Sep 2020
  18. Aug 2020
    1. ReconfigBehSci {@SciBeh} (2020). it's definitely worth considering a broad range of ideas...but does this not run into the same difficulties that plagued "shielding"? Twitter. Retrieved from: https://twitter.com/i/web/status/1297563172723929088

    1. Sherrard-Smith, E., Hogan, A. B., Hamlet, A., Watson, O. J., Whittaker, C., Winskill, P., Ali, F., Mohammad, A. B., Uhomoibhi, P., Maikore, I., Ogbulafor, N., Nikau, J., Kont, M. D., Challenger, J. D., Verity, R., Lambert, B., Cairns, M., Rao, B., Baguelin, M., … Churcher, T. S. (2020). The potential public health consequences of COVID-19 on malaria in Africa. Nature Medicine, 1–6. https://doi.org/10.1038/s41591-020-1025-y

  19. Jul 2020
  20. Jun 2020
  21. May 2020
    1. Chu, H. Y., Englund, J. A., Starita, L. M., Famulare, M., Brandstetter, E., Nickerson, D. A., Rieder, M. J., Adler, A., Lacombe, K., Kim, A. E., Graham, C., Logue, J., Wolf, C. R., Heimonen, J., McCulloch, D. J., Han, P. D., Sibley, T. R., Lee, J., Ilcisin, M., … Bedford, T. (2020). Early Detection of Covid-19 through a Citywide Pandemic Surveillance Platform. New England Journal of Medicine, NEJMc2008646. https://doi.org/10.1056/NEJMc2008646

  22. Apr 2020