Antidote for Fake Everything

In this digital era, anything can be faked; followers, news, experts, emails and so on.  The possibilities are limited only by the imagination of the faker.  It turns out that these issues were addressed back in 1996, by Carl Sagan, the world-famous astronomer.  His context was UFO’s, but his formula for separating facts from fiction is even more applicable today.  He called his 9-step process “The Fine Art of Baloney Detection” and described it in his best-selling book, The Demon Haunted World.  Here is a summary:

  1. Whenever possible, there must be independent confirmation of the “facts”
  2. Encourage substantive debate on the evidence by knowledgeable proponents
  3. Do not overweight arguments from so called authorities
  4. Spin more than one hypothesis for the evidence
  5. Try not to get too attached to your own hypothesis
  6. Quantify competing hypotheses
  7. If using a chained argument, every link must work
  8. Occam’s Razor:  choose the simpler of two hypotheses
  9. Can the hypothesis be tested?

Keep this list in mind when you are confronted with information that may have significant consequences for you.

*** This is a Security Bloggers Network syndicated blog from Security Connections authored by Frederick Scholl. Read the original post at: https://www.monarch-info.com/blog_direct_link.cfm?blog_id=64975&Antidote-for-Fake-Everything

Recent Posts

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

1 hour ago

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

1 hour ago

Smart DNS: Delivering the Best Subscriber Experience

This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…

2 hours ago

New Microsoft Spear-Phishing Attack Uses Exact Domain Spoofing Tactic

Security researchers detected a new spear-phishing attack that’s using an exact domain spoofing tactic in order to impersonate Microsoft. On…

4 hours ago

6 ways to use analytics to deliver an exceptional end-user experience: Part 3

Welcome back to the last part of our three-part blog series on how to leverage analytics to deliver an exceptional…

4 hours ago

Public Cloud Down Again? Predictions for 2021.

In 2021, organizations will be more willing to hedge against having all computing eggs in one vendor basket. The post…

4 hours ago