Author Archives: Jay

San Francisco had allowed police to deploy robots that kill.

Reading Time: 5 minutes

All John Connors should immediately go into hiding. Yes, the Terminator might have just become a reality with San Francisco allowing police to deploy robots that kill. Oh boy, does this pose some serious concerns about privacy and ethics…

Known for its eclectic population, iconic landmarks, and its status as an epicenter for innovation & technology, it is no doubt that San Francisco has played an important role in the development of robotics & artificial intelligence. The city is home to multiple technology companies and research establishments that are constantly working on cutting-edge technologies, including the development of robots that are skilled at performing mixed tasks.

However, the use of robots and AI has raised concerns about their potential impact on society and the economy. One particularly controversial topic is the development of “killer robots,” or autonomous weapons systems that are designed to use deadly force without human intervention.

It all started 6 years ago when a robot in Dallas was used to kill a shooter by attaching C-4s to its arm and detonating it as it reached the location of the shooter¹.

Critics argue that killer robots could be used to carry out military operations or carry out assassinations, and could potentially be used to commit war crimes. There are also concerns about the potential for these weapons to be hacked or used against their creators. Can you really trust a robot to save you? Is San Francisco really comfortable with putting the lives of their citizens to a robot that doesn’t even have moral values? What if such a situation arises “when risk of loss of life to members of the public or officers is imminent and officers cannot subdue the threat after using alternative force options or de-escalation tactics²” (Boyette, 2022), could you really trust a robot NOT to hurt someone other than the target, ie people dying in the crossfire, accidentally or otherwise, due to the robot’s aiming function being inaccurate or due to the robot malfunctioning in other areas? What if the robot misidentifies the target, for example, in the case of identical twins where they share a significant amount of the same DNA?

On the other hand though, if these lethal robots are manufactured and used correctly, they can indeed be used in situations where the threat is imminent and officers are unable to subdue the threat. What’s more, it will remove officers from the line of fire and prevent them from acting on the situation directly, removing them from harm’s way. It will also leave officers to attend to other, less serious, and demanding calls/crimes, although I doubt that will happen, given the fact that if a robot is required to neutralize the threat, you should have officers on the scene.

Another point I’d like to make is that these robots are far from making the job of officers obsolete, as they can never replicate the moral values we have and follow, and the “gut feeling” we get or the “instincts” we have to make the right decision. And I’m confident that most of us do not want our lives to be in the hands of a robot, or at least an unsupervised robot, ie not having a human presence alongside it or guiding it at the very least.

Furthermore, this would just make killing easier for the police and some police departments abuse their power over their citizens already so this would just make the citizens even more afraid. Also, the officers can deploy these robots even when it’s not needed (waste of resources) or can deploy these robots before even trying to subdue the threat themselves in the regular way that officers often do and this can be a threat as the officers can slowly start to resort to this option ONLY in cases involving guns, for example, as they would see it as an “imminent threat” and would rather use a robot than risk their own life.

The development of killer robots has sparked a debate about the ethical implications of AI and the role of humans in the decision-making process. Some argue that the development of these weapons should be strictly regulated or banned, while others believe that they could potentially be used for defensive purposes.

Regardless of one’s stance on the issue, it is clear that the development of killer robots is a complex and controversial topic that raises important ethical and moral questions about the role of technology in society. As a leader in AI and robotics, San Francisco will undoubtedly play a key role in shaping the future of these technologies.

Edit: Just days after the bill had passed for killer robots being used in life-or-death situations, San Francisco has reversed its plan.


Bibliography

¹Derico, Ben, and James Clayton. “San Francisco to Allow Police ‘Killer Robots’.” BBC News, BBC, 30 Nov. 2022, https://www.bbc.com/news/technology-63816454. Accessed 01 Dec. 2022.

²Boyette, Chris, and Zoe Sottile. “San Francisco Supervisors Vote to Allow Police to Use Robots to Kill.” CNN, Cable News Network, 30 Nov. 2022, https://edition.cnn.com/2022/11/30/us/san-francisco-police-remote-control-robots/index.html#:~:text=San%20Francisco%20supervisors%20vote%20to%20allow%20police%20to%20use%20robots%20to%20kill,-By%20Chris%20Boyette&text=The%20San%20Francisco%20Board%20of,lethal%20force%20in%20extraordinary%20circumstances. Accessed 02 Dec. 2022.

Asma-Sadeque, Samira. “San Francisco Police Propose Using Robots Capable of ‘Deadly Force’.” The Guardian, Guardian News and Media, 24 Nov. 2022, https://www.theguardian.com/us-news/2022/nov/24/san-francisco-police-propose-using-robots-capable-of-deadly-force. Accessed 01 Dec. 2022.

Duret, Daphne. “What San Francisco’s Killer Robots Debate Tells Us about Policing.” The Marshall Project, The Marshall Project, 10 Dec. 2022, https://www.themarshallproject.org/2022/12/10/san-francisco-killer-robots-policing-debate. Accessed 11 Dec. 2022.

Har, Janie. “San Francisco Will Allow Police to Deploy Robots That Kill.” AP NEWS, Associated Press, 30 Nov. 2022, https://apnews.com/article/police-san-francisco-government-and-politics-d26121d7f7afb070102932e6a0754aa5. Accessed 02 Dec. 2022.

Morris, J.D., and Annie Vainshtein. “’Killer Robots’ Approved by S.F. for Extreme Cases. Here’s Why Critics Are Still Worried.” San Francisco Chronicle, San Francisco Chronicle, 29 Nov. 2022, https://www.sfchronicle.com/sf/article/S-F-could-approve-the-use-of-killer-robots-17618170.php. Accessed 01 Dec. 2022.

Shapiro, Ari, and Brianna Scott. “San Francisco Considers Allowing Law Enforcement Robots to Use Lethal Force.” NPR, NPR, 28 Nov. 2022, https://www.npr.org/2022/11/28/1139523832/san-francisco-considers-allowing-law-enforcement-robots-to-use-lethal-force. Accessed 01 Dec. 2022.

Stokel-Walker, Chris. “San Francisco Has Reversed Its Killer Robot Plan.” WIRED UK, WIRED UK, 7 Dec. 2022, https://www.wired.co.uk/article/san-francisco-police-killer-robots-ban. Accessed 09 Dec. 2022.

Tangermann, Victor. “San Francisco Cops Now Allowed to Use Robots to Kill People.” Futurism, Futurism, 30 Nov. 2022, https://futurism.com/the-byte/san-francisco-cops-allowed-use-robots-kill-people. Accessed 03 Dec. 2022.

Tran, Tony Ho. “San Francisco Cops Propose Using Killer Robots to Fight Crime.” The Daily Beast, The Daily Beast Company, 29 Nov. 2022, https://www.thedailybeast.com/san-francisco-cops-propose-using-killer-robots-to-fight-crime. Accessed 03 Dec. 2022.

Weber, Jesse, and Chad Ayers. “COP-Controlled Robots Authorized to Kill in San Francisco.” YouTube, Law&Crime Network, 1 Dec. 2022, https://www.youtube.com/watch?v=BzHqSaY0ZJ8. Accessed 04 Dec. 2022.

Wu, Daniel. “Can Police Use Robots to Kill? San Francisco Voted Yes.” The Washington Post, WP Company, 30 Nov. 2022, https://www.washingtonpost.com/nation/2022/11/30/san-francisco-police-robots-kill/. Accessed 03 Dec. 2022.

Musk’s Neuralink hopes to implant a computer in the human brain.

Reading Time: 4 minutes

Brain Implants…yikes. Can you imagine somebody inserting a coin-sized computer chip inside your brain? Well, in about 6 months, you won’t have to or so Musk says.

We’ve recently heard a lot about Elon Musk, majorly due to his takeover of Twitter. And amongst his more…questionable choices, we find Neuralink.

Afraid of AI's? Elon Musk's Neuralink has the answer: join them.

Neuralink is a neurotechnology company that was founded by Elon Musk and others in 2016 with the sole purpose of developing brain-machine interfaces (BMIs) that would allow the human brain to communicate directly with computers, potentially improving the lives of people with certain brain disorders and disabilities. In this blog post, we will take a closer look at Neuralink, its brain implants, and what the future might hold for this technology.

The human brain is an incredibly complex and sophisticated organ, with billions of neurons and trillions of connections between them. Despite our best efforts, we still do not fully understand how the brain works, and many of its mysteries remain unsolved. However, thanks to recent advances in neuroscience and technology, we are starting to make progress in unlocking the secrets of the brain.

One of the key challenges in studying the brain is the fact that it is a highly protected organ, encased in the skull and surrounded by layers of tissue and fluid. This makes it difficult to access and study directly, which has limited our understanding of how it works. However, recent advances in brain-machine interfaces (BMIs) have started to change this.

BMIs allow the brain to communicate directly with external devices, such as computers. They typically consist of a small device that is implanted in the brain and can record brain activity and stimulate specific areas of the brain. By doing this, BMIs can provide a window into the workings of the brain, and allow us to better understand how it functions.

One potential application of this technology is in the treatment of brain disorders, such as epilepsy and Parkinson’s disease. Epilepsy is a disorder that is characterized by seizures, which are sudden, uncontrolled bursts of electrical activity in the brain. By recording brain activity and stimulating specific areas of the brain, a Neuralink implant could help prevent seizures.

Parkinson’s disease is another disorder that could potentially be treated with Neuralink’s technology. Parkinson’s is a neurological disorder that affects movement and can cause tremors, stiffness, and difficulty with coordination. Using a brain implant can provide more precise and controlled stimulation than other treatments, such as medications. This can help to reduce the side effects of treatment, such as dizziness and nausea. Additionally, brain implants can be adjusted or turned off as needed, allowing for greater flexibility in the treatment of Parkinson’s disease.

Musk had recently held a show and tell where a video was shown of a monkey controlling a mouse and keyboard using a brain implant. He also mentioned that brain implants developed by Neuralink could help blind people see and restore full body functionality of those with a damaged spinal cord.

However, Neuralink is far from its competition. For example, Synchron is another company that specializes in the field of brain implants. Not only have they already begun human trials and have had major success, but their brain implants don’t even require brain surgery! What’s more, a majority of neuroscientists claim that Neuralink’s success of a monkey being able to control a computer isn’t as big of a deal when compared to Synchron. Therefore, some might argue that Neuralink won’t be successful at all.

Now, while these brain implants from Neuralink claim to do the impossible, there are some concerns regarding ethical and sociopolitical norms. For example, some of the monkeys used in their experiments were treated harshly and had to be euthanized as a result of inadequate animal care or malfunction of the brain implant. In fact, an animal rights group had to file a complaint about it too. Furthermore, the way our brain works can make brain implants lose their functionality. It is said that our brain creates something known as “scar tissue” which forms around the implant itself when the brain detects or considers it to be made of a foreign object/body. Too much scar tissue around the implant though can cause it to lose its functionality. In addition to this, brain tissue frequently moves around in our skull which could render implants to be useless as they lose contact with the neurons inside our brain or are moved away from their target location. Moving on, I’ve recently learned that brain implants can be hacked! This can lead to people making unethical decisions and losing control over their own minds!

It’s safe to say that we humans are far from perfecting the use of brain implants and even further from the threat of “brainjacking” i.e. hacking brain implants. What do you think about this? Will you be willing to get a brain implant if the need arises?


Bibliography

Radcliffe, Shawn. “Experts Have Questions about Elon Musk’s Brain Implant from Neuralink.” Healthline, 5 Dec. 2022, https://www.healthline.com/health-news/why-experts-are-skeptical-of-elon-musks-brain-implants. Accessed 06 Dec. 2022.

Capoot, Ashley. “Elon Musk Shows off Updates to His Brain Chips and Says He’s Going to Install One in Himself When They Are Ready.” CNBC, 1 Dec. 2022, https://www.cnbc.com/2022/12/01/elon-musks-neuralink-makes-big-claims-but-experts-are-skeptical-.html. Accessed 03 Dec. 2022.

Wattles, Jackie. “Elon Musk’s Neuralink Shows Brain Implant Prototype and Robotic Surgeon during Recruiting Event | CNN Business.” CNN, 1 Dec. 2022, https://edition.cnn.com/2022/11/30/tech/elon-musk-neuralink-show-and-tell-scn/index.html. Accessed 03 Dec. 2022.

Euronews and Reuters. “Musk Says Neuralink Brain Chips Could Be Tested in Humans in 6 Months.” Euronews, 1 Dec. 2022, https://www.euronews.com/next/2022/12/01/elon-musk-expects-neuralink-to-test-brain-chip-implants-in-human-patients-in-6-months. Accessed 02 Dec. 2022.

Hamilton, Isobel Asher. “The Story of Neuralink: Elon Musk’s AI Brain-Chip Company Where He Had Twins with a Top Executive.” Business Insider, 3 Dec. 2022, https://www.businessinsider.com/neuralink-elon-musk-microchips-brains-ai-2021-2?IR=T. Accessed 04 Dec. 2022.

Hernandez, Daniela. “Elon Musk Says Brain Implant Startup Neuralink Should Be Ready for Human Testing in Six Months.” The Wall Street Journal, 1 Dec. 2022, https://www.wsj.com/articles/elon-musks-neuralink-set-to-show-and-tell-latest-brain-computer-advances-at-event-11669785946. Accessed 03 Dec. 2022.

Prado, Guia Marie Del. “This One Big Problem Is Why We Can’t Control Computers with Our Brains Yet.” Business Insider, 16 June 2015, https://www.businessinsider.com/huge-problem-with-brain-implants-causing-scarring-2015-6?IR=T. Accessed 02 Dec. 2022.

Bayar, Gozde. “IT Expert Issues Warning on Computer Brain Chips.” Anadolu Agency, 12 Sept. 2020, https://www.aa.com.tr/en/science-technology/it-expert-issues-warning-on-computer-brain-chips/1970964. Accessed 05 Dec. 2022.

Writer, Staff. “Can Elon Musk’s Neuralink Make Us Smarter with Brain Chips?” Bold Business, 17 Jan. 2019, https://www.boldbusiness.com/digital/elon-musks-neuralink-brain-chips/. Accessed 05 Dec. 2022.

The end of passwords.

Reading Time: 8 minutes

It’s high time that we finally pivot away to other authentication methods rather than using infamously vulnerable alphanumerics to protect our private data.

Passwords And People: Your Secret Weapons Against Cybercriminals

It’s common knowledge that passwords are one of the most widely used authentication methods for protecting our private data, however, it may be a surprise to know how common they actually are. As of April 2022, there were roughly 300 billion passwords in use, which averages to around 38 passwords per person¹. Hence, it is safe to say that passwords have played a major role in the world of cybersecurity. But that needs to change. And I am not the only one who thinks it.

Giant Tech companies, such as Apple and Microsoft, have made plans to make passwords redundant by announcing their intentions earlier this year, ironically on World Password day, to implement new, universal passwordless sign-in methods, such as biometrics including face and fingerprint recognition, across all of their platforms and devices².

Most of us might already be familiar with these types of authentication methods as they are most often used to unlock our android and apple devices, confirm payments, and more.

But why should we change to passwordless authentication methods? What’s wrong with passwords? Read below to find out!

The beginning of passwords.

In 1961, a pioneer in the field of computer science, MIT professor Fernando Corbato, came across a challenge. Back in the 1960s, all professors at the MIT university were using a shared computer system known as the Compatible Time-Sharing System, or CTSS³. Therefore, all of their private files were stored in a single disk which would be accessed through a common mainframe. Worried about the fact that their individual files could be seen and accessed by anyone, Fernando came up with a solution – passwords. He gave each user a password with which they can only access their own files and no one else’s.

As time went on and computers became more accessible, passwords were, and still are, used as the main authentication method to protect private files due to their simplicity, which is now seen as one of its major flaws. Sure, some websites make it mandatory to have an alphanumeric password with special characters but they bring up their own set of problems and there’s only so much you can do to prevent unauthorized access to data through passwords, which brings me to my next point.

What’s wrong with passwords?

Here are the 2 major problems that occur with the use of passwords –

  1. Passwords aren’t User Friendly – As mentioned earlier, an attempt to make passwords more secure by mandating users to include both upper and lower case characters, special characters, and numbers while also requiring a minimum password length, makes it less user-friendly. Here’s why – by making lengthy and complex passwords, not only are they hard to remember but as a result, we often end up saving them on our browsers/password manager (which can be hacked, stolen, and leaked) or end up resetting the password and using the same password across multiple websites…which makes it less secure.
  2. Passwords aren’t Secure – It might be challenging to strike a balance between security and usability because a password that is easy to remember is also insecure, and a password that’s secure is harder to remember. Secure passwords might not be easily guessed compared to insecure passwords, but both types of passwords can be hacked and stolen through, for example, a brute force attack and can further be leaked or sold to third parties. Moreover, passwords can be forgotten which often ends up in resetting the password which can be troublesome if the same forgotten password was used for multiple websites.

Passwordless ways of authentication.

biometrics cybrary

In order to abandon passwords as a form of security and authentication, we need to create and implement/use other methods of securing private data. One of these security methods is already being widely used, most commonly, to unlock devices – Biometrics.

Biometrics

There are two types of biometrics that are often used for authentication – fingerprints and facial recognition. It is said that no two individuals have the same fingerprints, hence, not only does this make this authentication method more secure but it also removes the need to remember complex passwords. Moreover, it’s a faster process and improves user experience by removing the need to remember your fingerprint. Although this security method is much harder to bypass, it is not impossible, as fingerprints can be copied and replicated even though it’s hard to accomplish⁴.

Facial recognition is another biometric authentication method that uses a person’s face to verify his or her identity against already existing facial data. Facial recognition can be used by any device with digital photographic technology. For example, all modern models of iPhones are equipped with a TrueDepth camera system, neural networks, and bionic chips which all work together to project and analyze thousands of invisible dots in order to construct a 3-Dimensional map of your face and take an infrared image of it⁵. Similar to facial recognition, this method is a smooth, quick, and efficient way of authenticating a user and protecting your files. However, like any good authentication method, it has its disadvantages. For example, poor lighting can affect the efficiency of the system and might require multiple attempts to unlock the device/files. The use of facial accessories, such as face masks, scarves, hats, and more, can also lead to multiple unsuccessful attempts, and eventually, the system might ask you to remove them. Nonetheless, fingerprints and facial recognition are definitely a securer and safer way of authentication when compared with passwords.

Passwordless Multi-Factor Authentication

No, I am not referring to the security code or one-time password you get when you finally remember the correct password after multiple failed attempts, only to find out there’s an additional layer that requires you to enter another password, making you more frustrated.

This type of passwordless authentication method depends purely on a second device and eliminates the use of generating another password in the first place, which could’ve been accessed on the same device. It is slightly dependent on the use of biometrics and here’s how. For example, to log into your account, all you have to do is enter your email address and the system will send a push notification to the mobile number that is registered with the email. Unlike a normal 2-Factor Authentication where you are required to enter a password in the first place, and a security code or one-time password is sent to your email address which can be accessed on the same device, this type of authentication method requires you to open the push notification and approve the login attempt through 2 different ways – you will either be asked something in the lines of “We’ve noticed a login attempt from ABC device. Is this you?” and you’re required to choose yes or no. The second way is that the notification will contain 3 different numbers and you have to select the number that matches the number that is displayed on the device you are trying to log in to.

The push notification itself requires you to unlock the phone in the first place using biometric authentication, hence, it adds an extra layer of security. Furthermore, hackers or other third-party users who want to gain access to your account will find themselves in a difficult situation as they would need access to your phone and you⁶.

The only disadvantage this possibly portrays is that it is more time-consuming when compared to simply entering a password or using biometrics. Other than that, it is still considered to be safer and more securer than passwords.

The challenges of going passwordless.

One of the major challenges of using passwordless authentication is that it requires you to first create an account with a password before having the option to choose the passwordless authentication method. Another problem is that passwordless authentication will not be possible on legacy and older systems as they simply lack the technology to do so. Hence, if a company wishes to switch to passwordless authentication, replacing these legacy systems will become a necessity and would cost tens of thousands of dollars to do so.

Furthermore, there are legal and ethical concerns⁷ with the use of biometrics as a method of authentication as companies may not secure their employee’s biometric data or users might be suspicious of the software used to recognize their biometrics as, for example, the camera might never have been turned off after recognizing their face, which is a breach of privacy as the company might be using the camera to surveil or spy on them and can also be selling the data to third parties which can lead to even bigger problems such as identity theft and fraud.

Conclusion

There is no doubt that going passwordless would be a safer and smarter authentication method, especially as it guarantees a frictionless user experience and removes the threats of all password-based attacks as attackers wouldn’t be able to use passwords to log in simply because they won’t exist. This includes the two most dangerous attacks – Phishing and Brute Force attacks. Brute Force attacks would not work as there would be nothing to steal and Phishers wouldn’t be able to steal login credentials as they simply would not exist.

For those of you who are determined to use passwords, and we might be stuck with them for a while, I recommend using a password manager as they offer strong encryption and act as a place to keep all of your passwords in without having the need to memorize them. They also hold features such as generating and changing passwords in one click, and more. Even though they offer their own challenges, such as once hacked, all of your sensitive data will be vulnerable or your passwords might be being sold to third parties by the password managing companies themselves without consent, it is the best option for those who use and will continue to use passwords. But not all of us will be able to afford or want to pay for it.

With developments in technology and cyberattacks following suit, it is necessary that the required changes are made in relation to cybersecurity and that includes the end of passwords. It will undoubtedly take a while for websites and businesses to change from passwords to passwordless authentication methods but that time isn’t as far off as you might think…

Some facts and figures

Here are some facts and figures to help you decide whether you should go passwordless. What do you think? –

  • 90% of internet users fear that their passwords might be stolen¹.
  • More than 23 million people use “123456” (one of the most common passwords) as their password to protect their data¹.
  • 78% of Generation Z have been found using the same password across multiple accounts and websites⁸.
  • 73% of internet users believe that forgetting passwords is the most frustrating element of security⁸.
  • 69.7% of internet users fail to update their passwords once a year⁸.
  • 53% of internet users use only their memory to store and retrieve passwords⁸.
  • Only 35% of Americans trust password managers¹.
  • Every minute, 5-6 businesses become a victim of ransomware¹.

Bibliography

¹Krstic, Branko. “Impressive Password Statistics to Know in 2022.” WebTribunal, 6 Apr. 2022, webtribunal.net/blog/password-stats/#gref. Accessed 02 Nov. 2022.

²Bateman, Tom. “Big Tech Plans to Kill off Passwords Altogether. What next?” Euronews.next, 5 May 2022, www.euronews.com/next/2022/05/05/forget-passwords-apple-google-and-microsoft-say-you-won-t-need-them-at-all-in-the-future. Accessed 02 Nov. 2022.

³Holt, Rene. “A Short History of the Computer Password.” WeLiveSecurity, 4 May 2017, www.welivesecurity.com/2017/05/04/short-history-computer-password/. Accessed 03. Nov. 2022.

⁴Jirik, Pavel. “5 Popular Types of Biometric Authentication: Pros and Cons.” PHONEXIA Speech Technologies, 9 Sept. 2021, www.phonexia.com/blog/5-popular-types-of-biometric-authentication-pros-and-cons/. Accessed 04 Nov. 2022.

⁵Tillman, Maggie. “What Is Apple Face ID and How Does It Work?” Pocket-Lint, 4 Mar. 2022, www.pocket-lint.com/phones/news/apple/142207-what-is-apple-face-id-and-how-does-it-work. Accessed 04 Nov. 2022.

⁶Groeneveld, Rachid. “The Password Problem.” Nomios, 7 July 2021, www.nomios.com/news-blog/password-problem/. Acessed 04 Nov. 2022.

⁷Fernandez, Ray. “The Challenges Facing the Passwordless Future.” ESecurityPlanet, 25 Sept. 2022, www.esecurityplanet.com/applications/passwordless-challenges/. Accessed 04 Nov. 2022.

⁸Vojinovic, Ivana. “Save Your Data with These Empowering Password Statistics.” DataProt, 2 Nov. 2022, https://dataprot.net/statistics/password-statistics/. Accessed 05 Nov. 2022.

Honan, Mat. “The End of Passwords.” MIT Technology Review, 23 Feb. 2022, www.technologyreview.com/2022/02/23/1044953/password-login-cybersecurity/. Accessed 03 Nov. 2022.

Kinzer, Kelsey. “The Benefits and Challenges of Passwordless Authentication.” JumpCloud, 12 Jan. 2022, jumpcloud.com/blog/benefits-challenges-passwordless-authentication. Accessed 05 Nov. 2022.

Berhanu, Manny. “The Beginning of the End for Passwords.” FutureBusiness, 10 June 2022, future-business.org/the-beginning-of-the-end-for-passwords/. Accessed 03 Nov. 2022.

Rob. “The End of Passwords? Why the World Is Moving Away from This Traditional Method.” ROWND, 27 June 2022, blog.rownd.io/the-end-of-passwords-why-the-world-is-moving-away-from-this-traditional-method/. Accessed 05 Nov. 2022.

Tagged , ,