时间:2019-01-12 作者:英语课 分类:2015年VOA慢速英语(八)月


英语课

AS IT IS 2015-08-04 Digital Solution Helps Shield Online Activists 1 数字解决方案帮助保护网络活动人士


Chris Doten knows how dangerous conditions can be for democracy activists and journalists working under hostile governments. He is the head of digital technology programs at the National Democratic Institute, a non-governmental organization that supports openness in government. He helps news reporters and democracy activists protect their privacy from government spying while online.


“We do work in relatively 3 closed societies,” Mr. Doten said. “There are a lot of dangers, and we always try to take a thoughtful look at the risks that we’re incurring 4 for the people we’re working with.”


Those risks often include government raids, computer seizure 5, theft of private data and the identification of supporters and private email communications. These invasions can lead to arrest, expulsion from a country or worse. But Chris Doten said there’s a technological 6 solution that is helping 7 people around the world protect their online activities.


It is called The Amnesic 8 Incognito 9 Live System or “Tails.” In computer terms, a “live system” is a stand-alone operating system that runs directly off a DVD or, increasingly, a USB memory stick. A live system uses only on a computer’s RAM 2. None of the operating system files are saved anywhere.


Once downloaded to a portable disk drive or USB, users simply connect Tails to any computer and run it. When taken out of the computer, the live system leaves no evidence of ever being used on the computer.


Chris Doten says Tails comes with additional security applications that users can easily access.


“There’s also a multi-protocol chat client that can speak to Facebook, Google Chat, and others called Pidgin" he added.


A growing number of journalists and rights groups are using Tails.


The non-profit group Reporters Without Borders works in support of freedom of the press. It has suggested Tails for journalists who need to protect their sources. Activists in Tibet use Tails to securely document human-rights abuses there by the Chinese government. And groups working to fight violence within families are now using Tails to report abuse and protect victims' identities.


But the same system that helps protect human rights activists can be used by hackers 10, criminals or terrorists to hide their identity and activities online.


Mr. Doten said the real concern should be how often Internet activists, journalists and others are targeted online and then punished for their activities.


“I’m frankly 11 shocked at the state of digital security among U.S. journalists,” he said. “People who have real dangers that they’ve seen externally and internally at times.”


“The fact that newsrooms around the country – even the big ones – are not investing more in this I think is a real crime."


Words in this Story


journalist(s) - n. a person who writes news stories for newspapers, magazines, television, radio, or online publications


digital – adj. using or characterized by computer technology


online – adj. done over the Internet


data – n. facts or information used usually to calculate, analyze 12, or plan something


download(ed) – v. to move or copy a file, program, etc. from a usually larger computer system to another computer or device


portable – adj. easy to carry or move around


application(s) – n. a computer program that performs a particular task such as word processing


source(s) – n. someone or something that provides what is wanted or needed


hacker(s) – n.  a person who secretly gets access to a computer system in order to get information, cause damage, etc.



n.(政治活动的)积极分子,活动家( activist的名词复数 )
  • His research work was attacked by animal rights activists . 他的研究受到了动物权益维护者的抨击。
  • Party activists with lower middle class pedigrees are numerous. 党的激进分子中有很多出身于中产阶级下层。 来自《简明英汉词典》
(random access memory)随机存取存储器
  • 512k RAM is recommended and 640k RAM is preferred.推荐配置为512K内存,640K内存则更佳。
adv.比较...地,相对地
  • The rabbit is a relatively recent introduction in Australia.兔子是相对较新引入澳大利亚的物种。
  • The operation was relatively painless.手术相对来说不痛。
遭受,招致,引起( incur的现在分词 )
  • Many of the world's farmers are also incurring economic deficits. 世界上许多农民还在遭受经济上的亏损。
  • He spoke to the Don directly, taking a chance on incurring Michael's ill will. 他直接向老头子谈自己的意见,这显然要冒引起迈克尔反感的风险。 来自教父部分
n.没收;占有;抵押
  • The seizure of contraband is made by customs.那些走私品是被海关没收的。
  • The courts ordered the seizure of all her property.法院下令查封她所有的财产。
adj.技术的;工艺的
  • A successful company must keep up with the pace of technological change.一家成功的公司必须得跟上技术变革的步伐。
  • Today,the pace of life is increasing with technological advancements.当今, 随着科技进步,生活节奏不断增快。
n.食物的一份&adj.帮助人的,辅助的
  • The poor children regularly pony up for a second helping of my hamburger. 那些可怜的孩子们总是要求我把我的汉堡包再给他们一份。
  • By doing this, they may at times be helping to restore competition. 这样一来, 他在某些时候,有助于竞争的加强。
遗忘的; 失去记忆的; 失去存储的; 引起遗忘的
  • They arrive back in the US amnesic for the period of brainwashing. 他们返抵美国后,由于洗脑忘记了那段时间发生了什么。
  • The researchers tested four healthy individuals and four amnesic patients. 研究者测试了四个健康的人和四个失忆症患者。
adv.匿名地;n.隐姓埋名;adj.化装的,用假名的,隐匿姓名身份的
  • He preferred to remain incognito.他更喜欢继续隐姓埋名下去。
  • He didn't want to be recognized,so he travelled incognito.他不想被人认出,所以出行时隐瞒身分。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adv.坦白地,直率地;坦率地说
  • To speak frankly, I don't like the idea at all.老实说,我一点也不赞成这个主意。
  • Frankly speaking, I'm not opposed to reform.坦率地说,我不反对改革。
vt.分析,解析 (=analyse)
  • We should analyze the cause and effect of this event.我们应该分析这场事变的因果。
  • The teacher tried to analyze the cause of our failure.老师设法分析我们失败的原因。
标签: VOA慢速英语
学英语单词
acoustic beams
alter course to port
anfuso
anticipatory
back ground
bankeress
bawl sb out
Bexbach
ceso
chavel
chyromya hedia
Cisco Systems
clark's approximation
clock process
collection frequency
complete piping system
concrete pipe
cosupervised
de-industrialisations
diminution of crime
dissipative distortion
downward enrichment
drawing-room car
drunky
Elliotdale
employee benefit plans
end of one's patience
ettls
extensive range equipment
external path length of the tree
Falex friction machine
fluted-roller feed mechanism
foetal period
genrelizations
Grant I.
halodrymiun
hazeltine circuit
hot gas fan
hypothyroidisms
Ichkino
im pleadable
impaternate
inclination dip
isitt
jeep grand cherokee
juicy peach
kit-bag
Little Current
maintenance task
make a bet
Malayan province
marine west coast climate
mechanical counter
merit figure
methylbromide
moderator drain system
music rack
Mīrpur Batoro
N2 charging system
Neopyrithiamine
nephroblastomata
nestor
nominal focal ratio
nononsense
ocean glider
Ozawa Seiji
paintedpanel
paraffin-oil
PC-SIMV
perpusillus
precise ephemeris
property of synthetic latex
pulse-spreading specification
quadratic differential
ratio of cash to current liabilities
re-sites
sanlac
scsi bus termination
seine painter winch
senile warts of lid
Shipowners Mutual Association
slap leather
smooth treatment of shock wave
songful
starting inventory
state transition probability
steel tower supported stack
storm-petrel
streakline
sweating test
threaded hood
Thylacospermum caespitosum
Tolg
toll hierarchy
transfer valve
two-course beacon
unmonetized
vandenbrandite
vernier engine,vernier rocket
water-shield
Weizsaecker's theory
wexner