Difference between revisions of "Video Playlist"

From Simson Garfinkel
Jump to navigationJump to search
 
(25 intermediate revisions by the same user not shown)
Line 4: Line 4:
[http://www.youtube.com/watch?v=1nNgXBIMass Daynah Boyd speaking on unanticipated impacts of transparency laws], Gov 2.0 Expo, May 27, 2010.  Impact of Megan's law. There are now 700,000 people on US "sex offender registry lists," many of them teenagers convicted of statutory rape for having sex with their girlfriends/boyfriends or for sexting. Yes, 1 out of 7 minors are solicited online, but mostly it's from other minors, and there is no intent to meet offline. "Data is something we will fight over again and again." 14 minutes.
[http://www.youtube.com/watch?v=1nNgXBIMass Daynah Boyd speaking on unanticipated impacts of transparency laws], Gov 2.0 Expo, May 27, 2010.  Impact of Megan's law. There are now 700,000 people on US "sex offender registry lists," many of them teenagers convicted of statutory rape for having sex with their girlfriends/boyfriends or for sexting. Yes, 1 out of 7 minors are solicited online, but mostly it's from other minors, and there is no intent to meet offline. "Data is something we will fight over again and again." 14 minutes.


[http://www.youtube.com/watch?v=cB9h1dRHwCY Moxie Marlinspike speaks about changing threats to privacy.] Gone is the threat of TIA and government surveillance; the new threat is Google. May 22, 2010.
* [https://www.nsf.gov/events/event_summ.jsp?cntn_id=137037&org=CISE  MP3 of dana boyd's talk at NSF]


[http://www.youtube.com/watch?v=mApBa2qKVDM Trevor Paglen speaks at Google to discuss his book "Blank Spots in the Map: The Dark Geography of the Pentagon's Secret World."] February 11, 2009.
 
[http://www.youtube.com/watch?v=cB9h1dRHwCY Moxie Marlinspike speaks about changing threats to privacy.] Starting with the crypto wars of the 1990s, he says that the cypherpunks got the technology they wanted put it didn't produce the future they were expecting. Today everybody carries an always-on tracking device (called a cell phone); if you don't, you can't participate in informal social networks (people calling others). AdBlock no longer blocks Google Analytics, because Google added additional features to its JavaScript and encouraged web developers to use it for their website's key functionality. Marlinspike shows how the threat is no longer Total Information Awareness --- it's Google. One proposed solution is the "GoogleSharing Proxy," which is basically a MixNet for Google use that maintains a pool of Google identities. He also discusses off-the-record messaging. One hour. May 22, 2010.  Jump to parts [http://www.youtube.com/watch?v=DHyB8XCDjRw 2] [http://www.youtube.com/watch?v=0WZlgFc9LYg 3] [http://www.youtube.com/watch?v=orrYOtmyj-g 4] [http://www.youtube.com/watch?v=km_mT6y2Amw 5] [http://www.youtube.com/watch?v=faBdKiXILww 6]
 
[http://www.youtube.com/watch?v=mApBa2qKVDM Trevor Paglen speaks at Google to discuss his book "Blank Spots in the Map: The Dark Geography of the Pentagon's Secret World."] Paglen shows how search, correlation and inferencing can be used to reveal information that governments try to keep secret.  February 11, 2009.
 
==Computer Forensics==
[http://cyberspeak.libsyn.com/ CyberSpeak Postcast] A mostly weekly radio show of all things computer forensics.
 
[https://www.youtube.com/watch?v=PX2RjJAfTYg When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement], by Jennifer Granick  &  Riana Pfefferkorn, Black Hat, Published on Aug 16, 2016
 
==Computer Science==
 
* [https://www.youtube.com/watch?v=DJFKl_5JTnA Dr. Michael Stonebraker, My 10 Fears about the Future of the DBMS Field, Practice Talk, April 9 2018]
 
* [https://www.youtube.com/watch?v=KRcecxdGxvQ Dr. Michael Stonebraker, Big Data is (at least) Four Different Problems, Dec. 4, 2015]
 
* [https://www.youtube.com/watch?v=1BJuuUxCaaY Whitfield Diffie, Information Security—Before & After Public-Key Cryptography], 1 hour, 16 minutes. Filmed January 26, 2005
 
* [https://www.youtube.com/watch?v=FXWsmHoFs6Y&t=2049s Whitfield Diffie, Stanford Seminar - Cryptology and Security: the view from 2016], 1 hour, 16 minutes.  Filmed May 5, 2016
 
* [http://people.csail.mit.edu/rivest/ Ron Rivest]'s 2011 Killian Presentation [https://www.youtube.com/watch?v=w704skq5q_8 video on his involvement in public key cryptography] and the [https://people.csail.mit.edu/rivest/pubs/Riv15z.slides.pdf slides from a similar talk he gave in 2015]
 
* [https://www.usenix.org/conference/usenixsecurity18/presentation/mickens James Mickens 2018 Usenix Security Keynote]
 
* [https://www.youtube.com/watch?v=15RTC22Z2xI James Mickens] Blockchains are a Bad Idea (June 4, 2018)
 
===MIT Media Lab===
* [https://www.youtube.com/watch?v=-bFBr11Vq2s&feature=youtube_gdata Put That There Hack Video]
* [https://www.youtube.com/watch?v=sC5Zg0fU2e8&t=4s Put That There (1980)]
* [https://www.youtube.com/watch?v=RyBEUyEtxQo Put That There (original)]
* [https://www.youtube.com/watch?v=sC5Zg0fU2e8&start_radio=1&list=RDsC5Zg0fU2e8 Put That There and Blit Terminal]
* [https://www.youtube.com/watch?v=CbIn8p4_4CQ Put That There (1982)]
* [https://www.youtube.com/watch?v=PeWwfhsSqsc Put That There (10 min)]
* [https://www.youtube.com/watch?v=MDOQkGn9mic Put That There (two person version)]
 
==Science and Science Journalism==
* [http://vega.org.uk/video/subseries/8 Richard Feynman, The Douglas Robb Memorial Lectures, 1976]
* [https://futurism.com/the-feynman-lectures-are-now-online-and-free The Feynman Lectures on Physics]
* [https://www.youtube.com/results?search_query=Feynman%27s+Messenger+Lectures Feynman Lectures on YouTube]
* [https://www.youtube.com/watch?v=VL-YNAb_uXo&frags=pl%2Cwn Communicating Science and Technology in the 21st Century], Stephen Pinker: The Sense of Style: Scientific Communication for the 21st Century, December 22, 2014. MIT.
 
==Technology==
* [https://youtu.be/H8eP99neOVs Steve Jobs, 1997: Focus is about saying no]
 
==Politics==
* [https://www.youtube.com/watch?v=8m6ux-IeNo4 Israeli diplomat George Deek in Oslo speaking about his family's fleeing Jaffa in 1948] [https://www.miff.no/norge-og-israel/2014/10/05Denbestetalenavenisraelskdiplomat.htm Transcript in Norweegen]

Latest revision as of 08:33, 20 October 2019

Privacy

Introduction to 32nd International Conference of Data Protection and Privacy Commissioners, November 2010. Promo that appears to be designed to make people afraid and paralyzed, but which brings up lots of questions about the collection of data. 4 minutes.

Daynah Boyd speaking on unanticipated impacts of transparency laws, Gov 2.0 Expo, May 27, 2010. Impact of Megan's law. There are now 700,000 people on US "sex offender registry lists," many of them teenagers convicted of statutory rape for having sex with their girlfriends/boyfriends or for sexting. Yes, 1 out of 7 minors are solicited online, but mostly it's from other minors, and there is no intent to meet offline. "Data is something we will fight over again and again." 14 minutes.


Moxie Marlinspike speaks about changing threats to privacy. Starting with the crypto wars of the 1990s, he says that the cypherpunks got the technology they wanted put it didn't produce the future they were expecting. Today everybody carries an always-on tracking device (called a cell phone); if you don't, you can't participate in informal social networks (people calling others). AdBlock no longer blocks Google Analytics, because Google added additional features to its JavaScript and encouraged web developers to use it for their website's key functionality. Marlinspike shows how the threat is no longer Total Information Awareness --- it's Google. One proposed solution is the "GoogleSharing Proxy," which is basically a MixNet for Google use that maintains a pool of Google identities. He also discusses off-the-record messaging. One hour. May 22, 2010. Jump to parts 2 3 4 5 6

Trevor Paglen speaks at Google to discuss his book "Blank Spots in the Map: The Dark Geography of the Pentagon's Secret World." Paglen shows how search, correlation and inferencing can be used to reveal information that governments try to keep secret. February 11, 2009.

Computer Forensics

CyberSpeak Postcast A mostly weekly radio show of all things computer forensics.

When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement, by Jennifer Granick & Riana Pfefferkorn, Black Hat, Published on Aug 16, 2016

Computer Science

MIT Media Lab

Science and Science Journalism

Technology

Politics