u/Hopeful-Alfalfa5506

  • Consensus uses AI to answer research questions by searching and summarizing findings from peer-reviewed studies, providing evidence-based answers
  • Scite analyzes citations, classifying how papers support or contrast each other, helping researchers evaluate the credibility and impact of scientific claims
  • Research Rabbit shows relationship between research papers in a visual way

How reliable these tools are in your opinion?

reddit.com
u/Hopeful-Alfalfa5506 — 26 days ago

Although this community only has 6 members, which seems like a small number, I appreciate each one of you. Let's introduce ourselves. This community is also meant to connect.

I'll start. I'm a physics student from the Czech Republic but what I really love is coding. Especially things that support.. Well.. Democracy :D Which this subreddit is about.

What is your background? What do you like?

reddit.com
u/Hopeful-Alfalfa5506 — 1 month ago

This website pubpeer.com allows you to search for studies and literally highlights misinformation in them. If you find that interesting, maybe you want to checkout website I'm working on: cl4rify.com. Trying to build crowdsourced fack-checking tool. I will appreciate any feedback or collab.

reddit.com
u/Hopeful-Alfalfa5506 — 1 month ago

Purpose: Authentication = confirms message was sent by claimed user, Integrity = confirms message was not altered

Digital signature uses public keys. We are not focusing on encrypting the message for now. Only on digital signature. Sender creates pair of keys. Sends public key to receiver and keeps private key. Sender uses some hash algorithm to create a digest (output of the hash function) from the message. Encrypts the digest with his private key. Here private key is for encryption and public key for decryption. Encrypted digest is the digital signature. Sender sends digital signature and the message. Receiver decrypts signature with public key. If successful, he knows it came from claimed sender. Receiver also hashes the message with the same hashing algorithm and compares decrypted digest with the new digest. If equal, message has not been tampered.

reddit.com
u/Hopeful-Alfalfa5506 — 1 month ago

In public (asymmetric) key encryption person A wants to send a message to person B. B creates keys (public and private). B transfers the public key to A and keeps the private key. A encrypts the message and sends it over to B. B decrypts it with private key. Public key = encryption, private key = decryption. Keys are mathematically related. If it can be decrypted, it was not altered.

Problems: We still can not verify the sender. Solution? Digital signature

reddit.com
u/Hopeful-Alfalfa5506 — 1 month ago

In private (symmetric) key encryption person A creates pair of private keys. Transfers one key to person B. Both have the same private key. Person A encrypts a message using private key and sends it over to person B. B decrypts it using the same private key.

Problems: Key needs to be transfered to person B. Someone can get their hands on the key and both sides of communication are compromised. Solution? Public key encryption

reddit.com
u/Hopeful-Alfalfa5506 — 1 month ago