Difference between revisions of "Video Playlist"

From Simson Garfinkel
Jump to navigationJump to search
Line 4: Line 4:
 
[http://www.youtube.com/watch?v=1nNgXBIMass Daynah Boyd speaking on unanticipated impacts of transparency laws], Gov 2.0 Expo, May 27, 2010.  Impact of Megan's law. There are now 700,000 people on US "sex offender registry lists," many of them teenagers convicted of statutory rape for having sex with their girlfriends/boyfriends or for sexting. Yes, 1 out of 7 minors are solicited online, but mostly it's from other minors, and there is no intent to meet offline. "Data is something we will fight over again and again." 14 minutes.
 
[http://www.youtube.com/watch?v=1nNgXBIMass Daynah Boyd speaking on unanticipated impacts of transparency laws], Gov 2.0 Expo, May 27, 2010.  Impact of Megan's law. There are now 700,000 people on US "sex offender registry lists," many of them teenagers convicted of statutory rape for having sex with their girlfriends/boyfriends or for sexting. Yes, 1 out of 7 minors are solicited online, but mostly it's from other minors, and there is no intent to meet offline. "Data is something we will fight over again and again." 14 minutes.
  
[http://www.youtube.com/watch?v=cB9h1dRHwCY Moxie Marlinspike speaks about changing threats to privacy.] Starting with the crypto wars of the 1990s, he says that the cypherpunks got the technology they wanted put it didn't produce the future they were expecting. Today everybody carries an always-on tracking device (called a cell phone); if you don't, you can't participate in informal social networks (people calling others). AdBlock no longer blocks Google Analytics, because Google added additional features to its JavaScript and encouraged web developers to use it for their website's key functionality. Marlinspike shows how the threat is no longer Total Information Awareness --- it's Google. One proposed solution is the "GoogleSharing Proxy," which is basically a MixNet for Google use that maintains a pool of Google identities. He also discusses off-the-record messaging. One hour. May 22, 2010.  Jump to parts [http://www.youtube.com/watch?v=DHyB8XCDjRw 2] [http://www.youtube.com/watch?v=0WZlgFc9LYg 3] [http://www.youtube.com/watch?v=orrYOtmyj-g 4] [http://www.youtube.com/watch?v=km_mT6y2Amw 5]
+
[http://www.youtube.com/watch?v=cB9h1dRHwCY Moxie Marlinspike speaks about changing threats to privacy.] Starting with the crypto wars of the 1990s, he says that the cypherpunks got the technology they wanted put it didn't produce the future they were expecting. Today everybody carries an always-on tracking device (called a cell phone); if you don't, you can't participate in informal social networks (people calling others). AdBlock no longer blocks Google Analytics, because Google added additional features to its JavaScript and encouraged web developers to use it for their website's key functionality. Marlinspike shows how the threat is no longer Total Information Awareness --- it's Google. One proposed solution is the "GoogleSharing Proxy," which is basically a MixNet for Google use that maintains a pool of Google identities. He also discusses off-the-record messaging. One hour. May 22, 2010.  Jump to parts [http://www.youtube.com/watch?v=DHyB8XCDjRw 2] [http://www.youtube.com/watch?v=0WZlgFc9LYg 3] [http://www.youtube.com/watch?v=orrYOtmyj-g 4] [http://www.youtube.com/watch?v=km_mT6y2Amw 5] [http://www.youtube.com/watch?v=faBdKiXILww 6]
  
 
[http://www.youtube.com/watch?v=mApBa2qKVDM Trevor Paglen speaks at Google to discuss his book "Blank Spots in the Map: The Dark Geography of the Pentagon's Secret World."] Paglen shows how search, correlation and inferencing can be used to reveal information that governments try to keep secret.  February 11, 2009.
 
[http://www.youtube.com/watch?v=mApBa2qKVDM Trevor Paglen speaks at Google to discuss his book "Blank Spots in the Map: The Dark Geography of the Pentagon's Secret World."] Paglen shows how search, correlation and inferencing can be used to reveal information that governments try to keep secret.  February 11, 2009.

Revision as of 04:59, 1 November 2010

Privacy

Introduction to 32nd International Conference of Data Protection and Privacy Commissioners, November 2010. Promo that appears to be designed to make people afraid and paralyzed, but which brings up lots of questions about the collection of data. 4 minutes.

Daynah Boyd speaking on unanticipated impacts of transparency laws, Gov 2.0 Expo, May 27, 2010. Impact of Megan's law. There are now 700,000 people on US "sex offender registry lists," many of them teenagers convicted of statutory rape for having sex with their girlfriends/boyfriends or for sexting. Yes, 1 out of 7 minors are solicited online, but mostly it's from other minors, and there is no intent to meet offline. "Data is something we will fight over again and again." 14 minutes.

Moxie Marlinspike speaks about changing threats to privacy. Starting with the crypto wars of the 1990s, he says that the cypherpunks got the technology they wanted put it didn't produce the future they were expecting. Today everybody carries an always-on tracking device (called a cell phone); if you don't, you can't participate in informal social networks (people calling others). AdBlock no longer blocks Google Analytics, because Google added additional features to its JavaScript and encouraged web developers to use it for their website's key functionality. Marlinspike shows how the threat is no longer Total Information Awareness --- it's Google. One proposed solution is the "GoogleSharing Proxy," which is basically a MixNet for Google use that maintains a pool of Google identities. He also discusses off-the-record messaging. One hour. May 22, 2010. Jump to parts 2 3 4 5 6

Trevor Paglen speaks at Google to discuss his book "Blank Spots in the Map: The Dark Geography of the Pentagon's Secret World." Paglen shows how search, correlation and inferencing can be used to reveal information that governments try to keep secret. February 11, 2009.

Computer Forensics

CyberSpeak Postcast A mostly weekly radio show of all things computer forensics.