Browse Source

Fix problems with references to figures

Carsten Porth 5 years ago
parent
commit
e499abb1fa

+ 1 - 1
thesis/content/03-related-work/activitypub.tex

@@ -8,8 +8,8 @@ Users are called actors in ActivityPub and are represented by an associated acco
 
 \begin{figure}[h]
 	\includegraphics[width=1.0\textwidth]{activitypub-communication}
-	\label{fig:activitypub-communication}
 	\caption{Concept behind ActivityPub}
+	\label{fig:activitypub-communication}
 \end{figure}
 
 The outbox of an actor holds all his published posts. When accessing the outbox of an actor without authorization, the server delivers all public posts of the actor as response. If access with authorization occurs, the explicitly shared content is also transmitted.\\

+ 1 - 1
thesis/content/03-related-work/akasha.tex

@@ -18,8 +18,8 @@ With the announcement of the web version, the team behind AKASHA also released p
 \begin{figure}[h!]
 	\centering
 	\includegraphics[width=0.8\textwidth]{aeth-flow}
-	\label{fig:akasha-aeth-transitions}
 	\caption{AETH flow}
+	\label{fig:akasha-aeth-transitions}
 \end{figure}
 
 After a long period of silence, the entire project was converted in January 2019, almost three years after the start. The domain was changed from akasha.world to akasha.org and the focus shifted from a social network to an umbrella organization that unites several projects. In the AKASHA blog Alisie writes about a metamorphosis and compares the change from a caterpillar to a butterfly. The alpha and beta phases are said to have corresponded to the caterpillar phase, the second half of 2018 to the chrysalis stage and now the butterfly is supposed to unfold with all its beauty. However, it is left open how the new orientation will look like and how the social network will continue. On the website you will find a software section as well as a hardware section. However, there is no content available yet. The public launch of the social network in version 1.0 was actually planned for the fourth quarter of 2018. With this launch, the change from the Rinkeby test network to the Ethereum main network should also be completed. It is currently not known when the public launch will take place.

+ 1 - 1
thesis/content/03-related-work/facecloak.tex

@@ -16,8 +16,8 @@ After validating several available solutions for personal data protection, the r
 \begin{figure}[h!]
 	\centering
 	\includegraphics[width=0.7\textwidth]{facecloak-architecture}
-	\label{fig:facecloak-architecture}
 	\caption{Schematic representation of the Setup Phase (1), Encryption Phase (2) and Decryption Phase (3) and the data flow taking place between the entities.}
+	\label{fig:facecloak-architecture}
 \end{figure}
 
 During the setup phase, the browser extension is being installed and the encryption keys are generated. Afterwards the keys for decryption are shared with the trusted contacts. In phase two, when data worthy of protection is stored, it is transmitted in encrypted form to a third party server and stored there. Only fake data is transmitted to the social network server. 

+ 1 - 1
thesis/content/03-related-work/peepeth.tex

@@ -11,8 +11,8 @@ While the Smart Contracts are open source, the front end is closed source. So it
 \begin{figure}[h!]
 	\centering
 	\includegraphics[width=1.0\textwidth]{peepeth-architecture}
-	\label{fig:peepeth-architecture}
 	\caption{Peepeth architecture}
+	\label{fig:peepeth-architecture}
 \end{figure}
 
 The data written to the Ethereum blockchain cannot be deleted or modified. For Barton, this is a main advantage since everyone is forced to be aware of his actions and the self-confidence for his own actions is sharpened. Furthermore, this fact of immutability is the main argument for freedom of expression and against censorship. However, not all messages are presented in the Peepeth front end. If they violate Peepeth's terms of use, they will be filtered. Peepeth calls this procedure \enquote{moderation} and argues that this is by no means to be understood as censorship, but much more \enquote{on cultivating mindful engagement and positive contribution}.

+ 1 - 1
thesis/content/03-related-work/twitterize.tex

@@ -39,8 +39,8 @@ In the third phase, users can exchange messages using the previously shared hash
 \begin{figure}[h!]
 	\centering
 	\includegraphics[width=1.0\textwidth]{twitterize-information-flow}
-	\label{fig:twitterize-information-flow}
 	\caption{.\cite{daubert2014twitterize}}
+	\label{fig:twitterize-information-flow}
 \end{figure}
 
 \subsubsection{Proof of Concept}