Free Shipping

Secure Payment

easy returns

24/7 support

The Trash Dove Phenomenon

 July 20  | 0 Comments

Mark Zuckerberg had one bad date in college and Facebook was born. We have one bad date and Arjit Singh is on till the next one comes around. Anyways, Facebook has a proven track record of making the weirdest of all things famous. A few weeks ago it was the dude who was sprinkling salt all over the Internet (Saltbae). The last two days gave us the Trash Dove.
If you haven’t noticed a purple bird GIF appearing in Facebook comment threads, don’t worry, you soon will. The bird, throwing its head up and down, has been appearing on media outlets’ Facebook pages, irrelevant to the rest of the comments.

What is a Trash Dove for crying out loud?

Trash Dove is one of Facebook’s sticker sets which quickly became meme-worthy. The bobbing purple bird is seen doing many different activities in the set, such as holding a cell phone, squawking and wearing a donut around its neck. Other than that, we can tell you that the world is going completely bonkers over this new meme.
So here we bring to you the origin of this delightful albeit silly purple bird.
Syd Weiler, a talented illustrator, animator and Adobe Creative Resident from Florida coined the trash dove idea back in September 2016. She drew them live on her twitch channel over the weekend. It’s unclear as of yet what was the inspiration behind the effortlessly cool purple bird, but, the artist herself says it can be “whatever you want it to be.”
Upon hearing about Apple’s iOS10 sticker store, Weiler submitted her drawings. In no time, they became quite a hit on the App Store and were eventually syndicated by Facebook’s platform.
Syd’s doves were released on Facebook on Tuesday, January 31. The next day, she woke up to her personal Facebook page and Twitter account being blasted by fan-made trash dove memes. Even she was baffled albeit happy that her doves were famous. As Syd told Popdust, “My personal FB page had 700 likes on Thursday – it’s now around 35k. I didn’t really understand it, but it seemed like a lot of people were really loving my work, and that’s a great feeling as an artist.”She also created the official Trash Doves account, which now has +35k followers.

Get Skilled in Android Development

Where did all these fans come from within a few days?

According to Know Your Meme, the first meme featuring Syd’s headbanging purple pigeon originated on a Thai Facebook page Animals With Paws in the form of the below video. To date, the absurd video has garnered almost 4 million views!
The meme caught the attention of a few Thai news outlets, the #purplebird hashtag started trending on Twitter, and eventually, the craze made it (back) to the United States and Europe.
The exact reason for such abrupt virality is still unknown, although many speculate the fact that in Thai language, the word for bird – nok – also describes someone who is hopelessly single. Perfect for the Saddentimes day, right?
Now a simple Facebook search will show you multiple results ranging from standalone trash dove memes to actual pages, such as Trash Dove Conquer The World, Trash Dove Memes, etc. The scope of the meme is so wide, people are creating trash dove-inspired pins, makeup, cookies and whatnot.

Is there a particular reason as to why these doves went viral overnight?

None that we know for sure. But we are guessing that and some agree with us that the dove represents ‘Friend-zoning’ in Thai culture. This could be true considering that the Trash Dove shot up the charts on 14th February.
Like I said, Facebook users can go bonkers over anything!
But enough said about Facebook alone. The internet in general is the birthplace of various memes and trolls. It is also responsible for the and rise and downfall of people and things. Salt Bae and Pakistani Chaiwala are the discoveries of the internet which brought change in their career.

The Double-Edged Sword

However, Internet fame can often be a double-edged sword – viral attention seems like a great thing to have, but comes with pitfalls. While Weiler acknowledged the good parts, she also noted the darker side of the attention.
“I’m a quiet homebody – I like to sit at my desk and draw, and play video games. Overnight, I was flooded with attention, and that has only sped up for five days now,” she said. “The fan art and nice comments have been the highlight for me, but I’m amazed at how mean people can be to someone they’ve never met, because of something silly on-line. I didn’t ask for or sign up for any of this, but many people are blaming me, and I’ve even received some threats.”
As a result, Weiler said she has learned a lot about Internet security and the importance of two-step verification on her account. “Everyone always talks about ‘going viral’ as a great thing, but I don’t think I’d wish it on another artist. It’s better to spend time building a dedicated viewer base that will support you for you.”
On a more positive note, Weiler is looking ahead to future projects, specifically one involving raccoons!
So if in case you are thinking of becoming an overnight star like Weiler, it would be wise to set your Internet settings on the safe side.

What is Two Factor Authentication?

Two Factor Authentication, also known as 2FA is an extra layer of security that is known as “multi factor authentication”. It requires not only a password and username but also something that only, the user has on them. That is, a piece of information only they should know or have immediately to hand – such as a physical token. A username and password together with a piece of information that only the user knows makes it harder for potential intruders to gain access and steal that person’s personal data or identity.
Historically, two-factor authentication is not a new concept but its use has become far more prevalent with the digital age we now live in. Many people probably do not know this type of security process is called Two-Factor Authentication. They do not even think about it when using hardware tokens, issued by their bank to use with their card and a PIN when looking to complete Internet Banking transactions. Simply they are utilizing the benefits of this type of multi factor Authentication – i.e. “what they have” AND “what they know”.
Using a Two Factor Authentication process can help to lower the number of cases of identity theft on the Internet, as well as phishing via email because the criminal would need more than just the users name and password details.

What are the authentication factors?

The ways in which someone can be authenticated usually fall into three categories known as the factors of authentication, which include:
1. Knowledge factors — something the user knows, such as a password, PIN or shared secret.
2. Possession factors — something the user has, such as an ID card, security token or a smartphone.
3. Inherence factors, more commonly called biometrics — something the user is. These may be personal attributes mapped from physical characteristics, such as fingerprints, face and voice. It also includes behavioral biometrics, such as keystroke dynamics, gait or speech patterns.
Systems with more demanding requirements for security may use location and time as fourth and fifth factors. For example, users may be required to authenticate from specific locations, or during specific time windows.
Multifactor authentication involves two or more independent credentials for more secure transactions.

Types of two-factor authentication products

There are many different devices and services for implementing 2FA — from tokens to RFID cards, to smartphone apps. Two-factor authentication products can be divided into two parts.
1. Tokens that are given to users to use when logging in and,
2. Infrastructure or software that recognizes and authenticates access for users who are using their tokens correctly.

Authentication Tokens

The authentication tokens may be physical devices, such as key fobs or smart cards, or they may exist in software as mobile or desktop apps that generate PIN codes for authentication.
On the other side, organizations need to have some system in place to accept, process and allow or deny access to users authenticating with their tokens. This may be server software, a dedicated hardware server or provided as a service by a third-party vendor.
An important part of 2FA is ensuring the authenticated user is given access to all resources the user is approved for. So one important function of 2FA is linking the authentication system with an organization’s authentication data. Microsoft provides some of the infrastructure necessary for organizations to support 2FA in Windows 10 through Windows Hello. This can operate with Microsoft accounts, as well as authenticating users through Microsoft Active Directory (AD), Azure AD or with FIDO 2.0.
So now that you know what to do, get your brains flexing. You could be the next Meme-master for all we know! Meanwhile, take a look at our course on Ethical Hacking.
Keep visiting for more updates on the courses.