Home
Search results “Cryptosystems examples of irony”
What is OBFUSCATION? What does OBFUSCATION mean? OBFUSCATION meaning & explanation
 
03:11
What is OBFUSCATION? What does OBFUSCATION mean? OBFUSCATION meaning - OBFUSCATION pronunciation - OBFUSCATION definition - OBFUSCATION explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. Obfuscation is the obscuring of intended meaning in communication, making the message confusing, willfully ambiguous, or harder to understand. It may be intentional or unintentional (although the former is usually connoted) and may result from circumlocution (yielding wordiness) or from use of jargon or even argot (yielding economy of words but excluding outsiders from the communicative value). Unintended obfuscation in expository writing is usually a natural trait of early drafts in the writing process, when the composition is not yet advanced, and it can be improved with critical thinking and revising, either by the writer or by another person with sufficient reading comprehension and editing skills. The name comes from Latin obfuscatio, from obfuscare ("to darken"). Obfustication is a common variant of the name, especially in British English. Synonyms include beclouding and abstrusity. Obscurantism is intentional obscurity, whether by withholding communication, obfuscating it, or both. Obfuscation may be used for many purposes. Doctors have been accused of using jargon to conceal unpleasant facts from a patient; American author Michael Crichton claimed that medical writing is a "highly skilled, calculated attempt to confuse the reader". B. F. Skinner, noted psychologist, commented on medical notation as a form of multiple audience control, which allows the doctor to communicate to the pharmacist things which might be opposed by the patient if they could understand it. "Eschew obfuscation", also stated as "eschew obfuscation, espouse elucidation", is a humorous fumblerule used by English teachers and professors when lecturing about proper writing techniques. Literally, the phrase means "avoid being unclear" or "avoid being unclear, support being clear", but the use of relatively uncommon words causes confusion in much of the audience (those lacking the vocabulary), making the statement an example of irony, and more precisely a heterological phrase. The phrase has appeared in print at least as early as 1959, when it was used as a section heading in a NASA document. An earlier similar phrase appears in Mark Twain's Fenimore Cooper's Literary Offenses, where he lists rule fourteen of good writing as "eschew surplusage". The philosopher Paul Grice used the phrase in the "Maxim of Manner", one of the Gricean maxims. In white-box cryptography, obfuscation refers to the protection of cryptographic keys from extraction when they are under the control of the adversary, e.g., as part of a DRM scheme.
Views: 3297 The Audiopedia
Make your own kind of Encryption with PHP
 
11:21
In this video we will learn how to create our own type of encryption, similar to MD5. Don't forget to like, favourite, comment and subscribe for more!
Views: 15793 howCode
Cryptocurrency & Blockchain
 
30:17
An in-depth look at Cryptocurrency & Blockchain, what they are, how they differ from existing methods, and what the advocates and critics have to say about them. Visit our Website: http://www.isaacarthur.net Join the Facebook Group: https://www.facebook.com/groups/1583992725237264/ Support the Channel on Patreon: https://www.patreon.com/IsaacArthur or with Bitcoin: https://www.coinbase.com/IsaacArthur Visit the sub-reddit: https://www.reddit.com/r/IsaacArthur/ Listen or Download the audio of this episode from Soundcloud: https://soundcloud.com/isaac-arthur-148927746/cryptocurrency Cover Art by Jakub Grygier: https://www.artstation.com/artist/jakub_grygier Further Reading: Original Paper on bitcoin: Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System" https://bitcoin.org/bitcoin.pdf Charles Stross Blog Entry "Why I want Bitcoin to die in a fire" http://www.antipope.org/charlie/blog-static/2013/12/why-i-want-bitcoin-to-die-in-a.html Daneil Jeffries rebuttal, "Why Charles Stross Doesn’t Know a Thing about Bitcoin": https://bitcoinmagazine.com/articles/charles-stross-doesnt-know-thing-bitcoin-1389147532 Abrahim Ladha’s “Hypothetical Problems concerning the Theory of Relativity on Cryptographic Currency Implementations”: https://arxiv.org/abs/1604.04265 Paul Krugman's paper "Theory of Interstellar Trade": https://www.princeton.edu/~pkrugman/interstellar.pdf
Views: 101482 Isaac Arthur
An introduction to Blockchain with Mark Russinovich - BRK2049
 
01:18:34
In this session, Mark explains how blockchains work, including how they use hashes, transactions, blocks, and proof-of-work consensus algorithms to build distributed ledgers. He presents the capabilities of some of the most common blockchain networks, then describes how the Confidential Consortium Blockchain Framework addresses their limitations to make blockchains suitable for a wide variety of business consortiums. Learn more: https://docs.microsoft.com/azure/blockchain/workbench/create-app
Views: 3642 Microsoft Ignite
David Mazières: "The Stellar Consensus Protocol" | Talks at Google
 
57:39
David Mazières: "The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus" This talk presents federated Byzantine agreement (FBA), a generalization of the standard Byzantine agreement problem. Unlike traditional Byzantine agreement--which presupposes unanimous agreement on system membership--the FBA model grants organizations individual control over whom to trust, allowing membership to grow organically out of pairwise relationships between participants. Compared to proof-of-work and proof-of-stake, two other decentralized alternatives to Byzantine agreement, FBA enables far more efficient constructions with greater margins of computational security. The talk further presents the Stellar consensus protocol (SCP), the first FBA protocol. SCP forms the backbone of the Stellar payment network, where it secures financial transactions. Other potential applications include secure timestamping and strengthening certificate transparency.
Views: 32912 Talks at Google
Blockchain Beyond Bitcoin - with Vinay Gupta | Virtual Futures Salon
 
01:32:20
Virtual Futures presents tech-visionary Vinay Gupta to dicuss cryptocurrencies and the uptake of the blockchain in all its applications. This event is organised in partnership with the Department of Economics at the University of Warwick as part of their 360 Lecture Series. Blockchain, also known as distributed ledger technology, has attracted a great deal of attention due to the hype surrounding cryptocurrencies like Bitcoin. Whilst blockchain technology might be able to drive economic change globally, the applications are innumerable. Among others, the implications include empowering impoverished individuals by bypassing banks for payments, generating personalized identities for voting, securing healthcare data, improving supply chain logistics, and allowing business to be carried out transparently. Vinay will share his thoughts on how a technology that permits secure and transparent solutions might transform the next decade. Vinay Gupta is a leading figure in the blockchain space. He is the co-founder of Mattereum, co-ordinated the release of the blockchain platform Ethereum in July 2015, and was strategic architect for ConsenSys, a technology hub focusing on the Ethereum blockchain and related applications. He was the designer of the National Blockchain Strategy for Dubai and is a partner at Hexayurt Capital, the technology-focused VC firm behind the Internet of Agreements. He has been involved in commercial software development since 1992 and his experience as a programmer and visionary has covered fields as diverse as medical imaging, flight simulation, computer graphics, cryptographic applications and the web. In conversation with Luke Robert Mason, Director of Virtual Futures. --- Follow the conversation on Twitter using #VFSalon Support Virtual Futures on Patreon: http://patreon.com/virtualfutures Find out more: http://virtualfutures.co.uk --- Credits Produced by Virtual Futures Camera by Jason ‘Jay’ Langdell: http://jam-av.com Sound by Luke Robert Mason Lighting by Ian O’Donoghue Edited by Luke Robert Mason Thanks to Bozena Beauclair Thanks to Anirudh Pai Thanks to Jeremy Smith Thanks to Charlotte White Hosted at the University of Warwick: http://go.warwick.ac.uk/economics --- Follow Virtual Futures on Social Media Twitter: http://twitter.com/virtualfutures Facebook: http://facebook.com/virtualfutures Instagram: http://instagram.com/virtualfutures Medium: http://medium.com/@virtualfutures SoundCloud: http://soundcloud.com/virtualfutures YouTube: http://youtube.com/virtualfutures --- Our Recording Equipment (Affiliate Links) RØDE Procaster Broadcast Dynamic Microphone: http://amzn.to/2wClVSx RØDE PSM1 Microphone Shock Mount: http://amzn.to/2wCh8Ri RØDE PSA1 Swivel Mount Studio Microphone Boom Arm: http://amzn.to/2f9tVYo Stagg 3m High Quality XLR to XLR Plug Microphone Cable: http://amzn.to/2wCjrnf Stagg 10m High Quality XLR to XLR Plug Microphone Cable: http://amzn.to/2y2En7y Zoom H6 Handy Recorder: http://amzn.to/2woqxg0 Zoom Q2n Handy Video Recorder: http://amzn.to/2g3gnxQ Canon EOS 80D: http://amzn.to/2eZo1oQ Canon EF 50 mm 1.8 STM Lens: http://amzn.to/2yQ37k5 Canon EF-S 18-135mm f/3.5-5.6 IS STM Lens: http://amzn.to/2y2EakM Manfrotto Befree Live Aluminium Travel Tripod with Fluid Head: http://amzn.to/2y257VT Sennheiser EW 100-ENG G3-GB Portable System: http://amzn.to/2H38Bgd
Views: 7153 Virtual Futures
Do You "Choose" To Have Your Privacy Invaded By Using Tech? | Idea Channel | PBS Digital Studios
 
12:23
Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateidea CHANGE YO PASSWORDS! The recent Heartbleed bug was, for many, just another reminder that our information will never be secure on the internet. We feel vulnerable and hopeless in the face of a long string of privacy concerns, and many argue that this is an inevitable result of technology. But since our culture has wholly jumped on the digital bandwagon, do we as individuals truly CHOOSE to sacrifice our privacy? Or maybe the better question is, how much do we even choose to use technology? Watch the episode and find out! ----------------------------------------­­­­­----------------------------- Assets: 2:19 http://thenoirguy.blogspot.com/2013/09/illustrated-friday-nightvale-poster.html 5:59 http://www.deesillustration.com/ ----------------------------------------­­­­­----------------------------- Comments: Chris Menning https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z13oshhozxnltxpjz04cilo4vwrie5nxnlg0k Aadel Bussinger https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z12zcndohxbfi5dli23dzvcpuvamyj0oy04 bethetroubleyouwant https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z133x3ww5y3vwrn4u04cex1a1uyfyrsjwvc0k johnoghue https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z13ogdjrjsfezvi4u04chpnyrqivczbaxng0k Tara Klementisz https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z12lerr4mmymfzq4z04cchzilovgxxvzt04 Sevada Rostamloo https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z135wpgaonmoc3lpj04cdtpawkveu1hiofs OkamiG15 https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z13pdltavqm0v3xlk225xblatrrddna4u04 FlawlessLogic https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z121dzdbtrudwdija04cdjgg5ny0tvc4fy40k Cyan Sonata https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z13nw1njpw2nzbx4d04cc3qpnpyqvdcihxw0k flishlish https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z13xcnqxvqjvytnbl04chfkp5zb1xp2qlm40k Grnvolpe https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z13kw1t4atvzjrspf04cgzo40vfmizlzlj0 Xalnop https://www.youtube.com/watch?v=YwQjBC0_2eA&google_comment_id=z13kw1t4atvzjrspf04cgzo40vfmizlzlj0 ----------------------------------------­­­­­----------------------------- TWEET OF THE WEEK: https://twitter.com/NamelessPC/status/459558640123269120 ----------------------------------------­­- MUSIC: "Europe" by Roglok (http://www.roglok.net) "Level 5" by Room for the Homeless (http://bit.ly/10N0Ykm) "Bouncy Castle" by Roglok (http://www.roglok.net) ":P" by Roglok (http://www.roglok.net) "Squarehead" by Roglok (http://www.roglok.net) "Number Cruncher" by Roglok (http://www.roglok.net) "Little Birthday Acid" by Roglok (http://www.roglok.net) "Topskore" by Roglok (http://www.roglok.net) "Anti Vanishing Spray" by Roglok (http://www.roglok.net) "Tarty Prash" by Roglok (http://www.roglok.net) "Carry on Carillon" by Roglok (http://www.roglok.net) "Uptown Tennis Club" by Roglok (http://www.roglok.net) "Squarehead" by Roglok (http://www.roglok.net) "Dream Of Autumn" by Night Shift Master https://soundcloud.com/dj-darkmatter-frequency/08-dream-of-autumn-night-shift-master "Insert Toy For Coin" by Eatme (http://eatme.pro/music/) "Dizor" by Outsider https://www.jamendo.com/en/artist/4402/outsider "Lets go back to the rock" by Outsider https://www.jamendo.com/en/artist/4402/outsider "Something like this" by Outsider https://www.jamendo.com/en/artist/4402/outsider Come hang out in the Idea Channel IRC! http://bit.ly/138EHBh Check out the Idea Channel SubReddit! http://bit.ly/GNklUq And the Idea Channel Facebook page! http://on.fb.me/1eVl4vP TRANSLATE THINGS @ http://ideachannel.subtitl.us Let us know what sorts of crazy ideas you have, about this episode and otherwise: Tweet at us! @pbsideachannel (yes, the longest twitter username ever) Email us! pbsideachannel [at] gmail [dot] com Idea Channel Facebook! http://Facebook.com/pbsideachannel Hosted by Mike Rugnetta (@mikerugnetta) Made by Kornhaber Brown (http://www.kornhaberbrown.com) _______________________________ Want some more Idea Channel? Can You Make a Movie So Bad It's Good On Purpose? http://youtu.be/YwQjBC0_2eA Did HIMYM Earn Its Ending? http://youtu.be/MVxWVQfbjxk How Much Can Data Improve Your Health? http://youtu.be/shbvhUMTPY4
Views: 281693 PBS Idea Channel
DEF CON 21 - Tom Ritter - De Anonymizing Alt Anonymous Messages
 
44:31
De-Anonymizing Alt.Anonymous.Messages TOM RITTER In recent years, new encryption programs like Tor, RedPhone, TextSecure, Cryptocat, and others have taken the spotlight - but the old guard of remailers and shared inboxes are still around. Alt.Anonymous.Messages is a stream of thousands of anonymous, encrypted messages, seemingly opaque to investigators. For the truly paranoid, there is no communication system that has better anonymity - providing features and resisting traffic analysis in ways that Tor does not. Or so is believed. After collecting as many back messages as possible and archiving new postings daily for four years, several types of analysis on the contents of alt.anonymous.messages will be presented and several ways to break sender and receiver anonymity explained. Messages will be directly and statistically correlated, communication graphs drawn, and we'll talk about what challenges the next generation of remailers and nymservs face, and how they should be designed. Tom Ritter is interested in nearly all aspects of cryptography, privacy, anonymity, and pseudonymity. He contributes to http://crypto.is and tries to explain the difference between Onion Routing and Mixing to as many people as he can. He is located corporeally in New York City, virtually at http://ritter.vg, and meta-physically has been lost for quite some time. Materials: https://www.defcon.org/images/defcon-21/dc-21-presentations/Ritter/DEFCON-21-Ritter-De-Anonymizing-Alt.Anonymous-Messages-Updated.pdf https://www.defcon.org/images/defcon-21/dc-21-presentations/Ritter/DEFCON-21-Ritter-De-Anonymizing-
Views: 2692 DEFCONConference
Ari Juels: "Tetraktys" | Talks at Google
 
39:59
Ari Juels visits Google's San Francisco office to present his book "Tetraktys". This event took place on Mar 5, 2010, as part of the [email protected] series. International computer security expert Ari Juels brings his extraordinary talents to fiction in a literary thriller that spans the centuries. Cryptographer and classicist Ambrose Jerusalem is a UC Berkeley graduate student with a beautiful girlfriend and a comfortable future, until the National Security Agency recruits him to track a strange pattern of computer break-ins. Individually, they might not mean much a State Department officialdiscovers a peculiar series of incriminating appointments in her computer calendar dating back to 18th century France; a corrupt president of the International Monetary Fund is startled by an oracular voice from his computer charging him with crimes against divine numerology and God but together, they provide disturbing evidence that someone has broken RSA encryption, the security lynchpin protecting the world s computer systems. Even more bizarre, a secret cult of latter-day followers of Pythagoras, the great Greek mathematician and philosopher who believed reality could be understood only through a mystical system of numbers, appears to be behind the attacks. With his deep knowledge of both cryptography and classical antiquity, Ambrose is the government s best chance to uncover the cult. Soon Ambrose discovers he is not only the hunter but the hunted, and the game is not simply code-breaking, but a deadly plan to alter the fate of the world.
Views: 10860 Talks at Google
Faculty Forum Online: Ron Rivest
 
45:50
Known best for his research in cryptography, computer and network security, electronic voting, and algorithms, Institute Professor Ron Rivest joined the MIT faculty in 1974.
Will EOS Be the End of Ethereum?!?! 10 Facts About EOS
 
15:37
What is EOS? EOS is blockchain based software & a platform created to support decentralized apps (aka dapps) that runs on delegated proof-of-stake consensus algorithm & was created by Dan Larimer. When observed through this over-simplified definition, EOS may bear a resemblance to Ethereum. But there are a few key differences. Whereas Ethereum can be somewhat viewed as a global computer, EOS.io is more similar to a global operating system. EOS provides databases, accounts, authentication, asynchronous communication, and the scheduling of applications across numerous CPU cores or clusters. Through its ownership model, EOS effectively eliminates transaction fees while boasting a potential throughput of millions of transactions per second. The technological basis for its creation comes from past proven ventures such as blockchain social platform Steemit and BitShares, a decentralized asset exchange. EOS co-founder, Daniel Larimer designed the graphene blockchain technology that powers both Steemit and BitShares. He also created the Delegated Proof of Stake algorithm that lies at the heart of EOS. The backbone of EOS’ nimble construct is its Delegated Proof-of-Stake (or DPos) consensus algorithm, which is tailor-fitted to meet the performance challenges required by dapps on the blockchain. 21 nodes (also known as witnesses) are elected through voting preference by token holders, and they're the only ones that can produce blocks. The EOS software enables these witnesses to create blocks every half second. Blocks are generated in rounds of 126 (or 6 blocks times 21 producers). Forks are unlikely to take place with DPoS, as block production is encouraged to be more of a cooperative process than a competitive one. DPoS in EOS comes with an added asynchronous Byzantine Fault Tolerance algorithm, which ensures the 100% confirmation of irreversibility within 1 second. The developers’ description of the EOS software highlights that it enables the vertical and horizontal scaling of decentralized applications. EOS relies on Graphene technologyThe open-source EOS software is scheduled for release in June of 2018, and even though it'll run single threaded, it'll allegedly include the necessary data structures for future parallel execution. Asynchronous communication and parallel execution are key features to ensuring EOS’ infinite-scaling potential. Users won’t have to go through the process again once a block is irreversibly added to the blockchain. EOS.io users will be able to selectively run applications they need, and configure nodes to process data they want. It therefore wouldn’t be necessary to run social media apps if the desired process is to run an exchange. Operational maintenance of the blockchain doesn’t require the participation of every node. An added flexibility feature comes from the DPoS consensus mechanism. EOS.io has also been designed with inter-chain communication in mind, and this, in short, is achieved by facilitating the generation process for proof-of-action existence and proof-of-action sequence. EOS.io will include self-describing database schemas and self-describing interfaces, meaning blockchain data will be human-readable. It'll also support many of the known programming languages such as Rust, Solidity, and C++. It uses a declarative permission scheme that enables a finely-tuned delegation of permission across accounts. Its power becomes real on a launched blockchain that integrates with the EOS.IO software. The company currently building the EOS software has stated that it has no intention of launching any public blockchain adopting said software after its open-source release. The distinction between “software” and “platform” has been very stressed upon. EOS.IO is the software currently under development, while the EOS Platform will be used to refer to the blockchain that adopts it. On a launched blockchain using the EOS software, the EOS token was designed to follow an ownership model instead of a “rental” model, which effectively eliminates transaction fees. This model gives EOS token holders access to the network’s storage, bandwidth, and processing power proportional to the stake they hold. Increasing the volume of available network resources is achieved by purchasing more EOS tokens. This enables developers to gradually scale up their applications while also receiving reliable bandwidth and computing power. Aside from the initial purchase of EOS tokens, zero transactions fees means no network development cost. EOS tokens also constitute a tool used in the voting process that decides which nodes will become block producers. It’s necessary to become an EOS token holder in order to obtain voting rights. Disclaimer: This is not financial advice. I absolve myself of all responsibility (directly or indirectly) for any damage, loss caused, alleged to be caused by, or in connection with the use of or reliance on any content, goods or services mentioned in this article. As usual, DYOR.
Cryptocurrencies  Oversight of New Assets in the Digital Age
 
02:01:54
Public Hearing: Cryptocurrencies Oversight of New Assets in the Digital Age Wednesday, July 18, 2018 – 10:00 a.m. 1300 Longworth House Office Building Washington, D.C. Full Committee – Public Hearing RE: Cryptocurrencies: Oversight of New Assets in the Digital Age
Views: 5033 Joey Rocket Cryptos
Scalable Blockchain For European Union? Lition Interview
 
19:00
Lition is a scalable public-private blockchain built for businesses with GDPR compliance in mind. In this sponsored interview, I talk to Dr. Lohwasser and Dr. Ha about what sets Lition's for peer-to-peer energy trading platform and the Lition blockchain. They designed a blockchain that both scales and complies with European GDPR Law (allows for deletion of data on the blockchain). #Ethereum #Lition #GDPR 0:53 Creating an Energy Trading Business on Blockchain 2:36 Making Blockchain Complaint for EU 12:24 Blockchain in German Parliament Blockchain Website: Lition.io Energy Trading Website: Lition.de 👍🏻Subscribe to Boxmining for Cryptocurrency Insight and News: https://www.youtube.com/c/boxmining 🔒Hardware Wallet: https://www.ledgerwallet.com/r/428b 📲Mobile Wallet: https://enjinwallet.io/ Brave Browser: https://brave.com/box831 #Bitcoin #Ethereum #Cryptocurrency #Crypto #Altcoins ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● Telegram groups (Discuss Crypto with us!) Telegram Discussion Group: https://t.me/Boxdatamining Telegram Announcements: https://t.me/boxminingChannel ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● ♨️Social (Add me on Social Media!) Instagram: https://www.instagram.com/boxmining/ Twitter: https://twitter.com/boxmining Facebook: https://www.facebook.com/boxmining Steemit: https://steemit.com/@boxmining ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● I'm not a professional financial adviser and you should always do your own research. I may hold the cryptocurrencies talked about in the video. ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬●
Views: 5345 Boxmining
DEF CON 21 - Alex Stamos - An Open Letter The White Hat's Dilemma
 
49:50
An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet ALEX STAMOS CO-FOUNDER AND CTO, ISEC PARTNERS The information security world is constantly buffeted by the struggle between whitehats, blackhats, antisec, greenhats, anarchists, statists and dozens of other self-identified interest groups. While much of this internecine conflict is easily dismissed as "InfoSec Drama", the noise of interpersonal grudges often obscures a legitimate and important debate: what is the definition of "security" to whom do we provide it? The last several years have made this external argument and internal ethical debate much more difficult to individuals gainfully employed in InfoSec, thanks to politically motivated prosecutions, domestic surveillance by democratic societies, and even the direct targeting of large companies by their home nations. What rules should guide us in deciding what jobs to take, what services to provide, and our actions in the public sphere? This talk does not have the answers, but hopefully can help the overall community ask the right questions. We will begin with the speaker's personal experience working for Aaron Swartz's defense and on several high-profile civil cases. We will then discuss recent events in offensive cyber-warfare and the new dilemmas this poses for defenders. Finally, the speaker will present one possible framework for ethical decision making in such a complicated time, and will unveil an effort to affect change in the White Hat community. Alex Stamos is a co-founder and CTO of iSEC Partners. While helping to build iSEC into an industry leader, Alex has been focused on helping his clients address their most difficult security challenges. He has worked to secure mobile platforms, cloud computing infrastructures and other emerging technologies while pushing forward the industry's understanding of how to build trustworthy systems in these new computing paradigms. He is a frequent speaker at conferences such as BlackHat, FS-ISAC, the Critical Infrastructure Protection Congress, Infragard, CanSecWest and Interop. Before forming iSEC, Alex was a Managing Security Consultant at @stake and had operational security responsibility at Loudcloud. He received a BSEE from the University of California, Berkeley.
Views: 2637 DEFCONConference
Google Internet Summit 2009: Security Session
 
01:26:06
Google Internet Summit 2009: The State of the Internet May 5, 2009 Security Session panelists are Whit Diffie, Steve Crocker, Chris DiBona, Eric Grosse, and Howard Schmidt. On May 5 and 6, 2009, in Mountain View, we brought together Googlers and leaders from academia and the corporate world for a 2-day summit to discuss the state of the global Internet. The goal of the summit was to collect a wide range of knowledge to inform Google's future plans--from product development and market reach to users' expectations and our ability to keep the Internet open yet secure. More than 30 speakers and moderators led discussions around 8 topics: Networks; Wireless and Sensor Technologies; Security; Standards; Applications; Democracy, Law, Policy and Regulation; Search and Cloud Computing; and The Future. Eric Schmidt, who offered some remarks, expressed optimism that the challenges we face with governments' walling off access to the Internet can be overcome technologically by building networks that are transparent, scalable, and open.
Views: 36944 GoogleTechTalks
DEF CON 21 - Panel - The ACLU Presents NSA Surveillance
 
44:12
The ACLU Presents: NSA Surveillance and More ALEX ABDO STAFF ATTORNEY, ACLU NATIONAL SECURITY PROJECT CATHERINE CRUMP STAFF ATTORNEY, ACLU SPEECH PRIVACY & TECHNOLOGY PROJECT CHRISTOPHER SOGHOIAN PRINCIPAL TECHNOLOGIST, ACLU SPEECH PRIVACY & TECHNOLOGY PROJECT KADE CROCKFORD ACLU OF MASSACHUSETTS TECHNOLOGY FOR LIBERTY PROJECT NICOLE OZER TECHNOLOGY AND CIVIL LIBERTIES POLICY DIRECTOR, ACLU OF CALIFORNIA From the NSA's PRISM and metadata programs to IMSI catchers, location tracking to surveillance drones, and warrantless wiretapping to the AP's emails -- this has been the year of surveillance. Come join the American Civil Liberties Union as we unravel the thicket of new technologies and laws that allow the U.S. government to surveil Americans in more intrusive ways than ever before. We will explore the latest news and trends in surveillance, reasons to despair, grounds to be hopeful, and ways in which you can help the ACLU's fight against government overreaching. Catherine Crump (@CatherineNCrump) s a Staff Attorney with the ACLU's Speech, Privacy and Technology Project. She specializes in free speech and privacy litigation, particularly regarding the impact of new technologies on First and Fourth Amendment rights. She is lead counsel in the ACLU's challenge to the government's suspicionless searches of laptops at the international border, and is litigating a series of cases challenging the government's claim it can track the location of people's cell phones without a warrant. Christopher Soghoian (@csoghoian) is the Principal Technologist with the ACLU's Speech, Privacy and Technology Project. He completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice, and recorded phone company executives bragging about their surveillance practices. Kade Crockford (@onekade) is director of the Technology for Liberty program at the ACLU of Massachusetts, where she quarterbacks the ACLU of Massachusetts' work challenging the growing surveillance state and defending core First and Fourth Amendment and due process rights. Kade is currently working on a long term project to document and challenge the militarization and federalization of state and local law enforcement, focusing on the procurement and deployment of advanced surveillance and weapons systems, towards the end of bringing local police back under local control. She built and maintains the dedicated privacy website www.PrivacySOS.org, which hosts the Privacy Matters blog. Alex Abdo (@AlexanderAbdo) is a staff attorney in the ACLU's National Security Project, where he litigates cases concerning the expansive surveillance policies of the post-9/11 era. For example, he was counsel in the ACLU's recent Supreme Court challenge to the NSA's warrantless wiretapping program; he is currently challenging the NSA's collection of all Americans' telephony metadata; and he is suing for release of the government's secret interpretation of Section 215 of the Patriot Act. Nicole Ozer is the Technology and Civil Liberties Policy Director at the ACLU of California. She works on the intersection of new technology, privacy, and free speech and developed the organization's online privacy campaign, Demand Your dotRights (www.dotrights.org). Nicole graduated magna cum laude from Amherst College, studied comparative civil rights history at the University of Cape Town, South Africa, and earned her J.D. with a Certificate in Law and Technology from Boalt Hall School of Law, University of California Berkeley. Before joining the ACLU, Nicole was an intellectual property attorney at Morrison & Foerster LLP. Nicole was recognized by San Jose Magazine in 2001 for being one of 20 "Women Making a Mark" in Silicon Valley.
Views: 2284 DEFCONConference
Breathedge Fix the Interphone Extend Your Oxygen Air Upgrade
 
15:26
Breathedge Fix the Interphone Extend Your Oxygen Link: https://youtu.be/crpPH5eku1I So the oxygen runs out pretty quick ontheis came and it is a right pain in the spacesuit. How do you make the oxygen balloon, how do you find rubber, how do you find condoms in space plus we need to summon help and need to fix the Interphone.... Here we will show you how to extend your oxygen and make a larger tank in Breathedge I cannot wait for RedRuins Softworks to release the next chapter. This game is available on Steam Games PC, Xbox and PS4 and is in my list of quality games for PC on Steam at the moment Wanna Chat? ************** Join the discussion on Discord https://discord.gg/HRCmDB4 WAYS TO SUPPORT THE CHANNEL ************************************ ✔️LIKE THE VIDEO ✔️SUBSCRIBE TO THE CHANNEL ✔️WATCHING THE STREAM Affiliate Links: *************** 💰 Get Elite dangerous for £19.99 *********************************** https://click.linksynergy.com/fs-bin/click?id=/xxfns2/XC4&offerid=577354.60&type=3&subid=0 https://www.facebook.com/breathedgegame/ https://twitter.com/Breathedge https://www.youtube.com/channel/UCWiB1kDWmjFPIFMTdj0eL9Q https://vk.com/breathedge” About Breathedge ++++++++++++++ Breathedge is an ironic outer space survival adventure game. Take on the role of a simple guy who just carried his grandpa's ashes to a galactic funeral and found himself in the middle of a universal conspiracy.A massive space hearse suffers a wreck in the deep space, leaving the area filled with debris, coffins, dead passengers and yourself. Survive in this interstellar dump, uncover a global conspiracy, save the princess and don’t break your fingers while tapping the keyboard as you travel around the world (keeping your display on for full immersion is advised).It took a long time for our ancestors to develop because they had no duct tape. You have it and you know how to use it. With this magical artifact, you can create a vast variety of useless objects and throw them out the airlock! There are also many useful items to be created, but be careful as this may result in completing the game.When all the people around you just hover around in the vacuum doing nothing but playing dead, various tools and gears will help you become the worst noisy neighbor ever. Create a unique space station, provide it with oxygen and electricity, install all kinds of equipment from solar panels to hamster farm, and turn it into a real bachelor pad by stuffing it with furniture mixed with all kind of junk.Yes, you heard that right, it’s your own private car horn! Besides that, you can assemble a small rocket, ride the dead or build a large space shuttle. Transportation helps you move faster, evade obstacles and see the death screen after a head-on collision. Surviving in space is fun, and surviving with a story is even more fun because you can just skip it all to annoy the scriptwriters! Breathedge offers you an intriguing plot with lots of dark jokes, cynical dialogues, an immortal chicken, a mad enemy, as well as badly animated cutscenes and other features of an excellent game. #breathedge #BREATHEDGESURVIVAL #breathedgeoxygentank breathedge gameplay pc
Views: 409 Ricardo's Gaming
Blockchain Technologies Conference - Marquette University
 
01:36:52
Marquette Business hosted Wisconsin's first Blockchain Technologies conference on November 9, 2017. This is part 1/2. Part 2: https://youtu.be/YsG1K0yJb38
Views: 519 Marquette Business
Edward Snowden and ACLU at SXSW (non-optimized audio version)
 
01:00:29
Take Action: https://www.aclu.org/immunity4snowden More information: https://www.aclu.org/nsa-surveillance Edward Snowden speaks about privacy and technology with the ACLU's Ben Wizner and Christopher Soghoian at SXSW Interactive.
Views: 251666 ACLU
Advanced Encryption Standard
 
22:42
The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is based on the Rijndael cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 642 Audiopedia
Patrick Jagoda on "Game Experiments..."
 
42:55
Sponsored by the University of Chicago's Franke Institute for the Humanities, the Franke Forum is a series of free public talks by renowned University scholars. This Franke Forum talk, "Game Experiments (or Playful Ways to Design Serious Research Interventions)" is given by Patrick Jagoda. Patrick Jagoda is Associate Professor in the Departments of English Language & Literature and Cinema & Media Studies and the College. In the early twenty-first century, games have influenced activities across fields such as business, marketing, psychology, education, and even warfare. Games operate increasingly as an experimental medium for practicing problem solving, testing hypotheses, and gathering data. This lecture explores this contemporary scene through a series of case studies from the Game Changer Chicago Design Lab: an organization that creates serious games that intervene in public health issues that impact youth.
Medical Devices Cybersecurity
 
01:42:30
Featuring Ken Hoyme - Director, Product & Engineering Systems Security - Boston Scientific Mr. Hoyme presents and answers questions in Dr. Brian Drawart's computer science class at the University of North Carolina Asheville.
Next-Generation Secure Computing Base | Wikipedia audio article
 
35:58
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base 00:03:04 1 History 00:03:13 1.1 Early development 00:06:38 1.2 As "Palladium" 00:08:50 1.3 As NGSCB 00:16:58 2 Architecture and technical details 00:18:08 2.1 Secure storage and attestation 00:19:27 2.2 Curtained memory 00:20:13 2.3 Applications 00:22:21 3 Uses and scenarios 00:24:56 3.1 WinHEC 2004 scenarios 00:26:21 4 Reception 00:35:38 5 Vulnerability Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.8315626692450702 Voice name: en-AU-Wavenet-D "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= The Next-Generation Secure Computing Base (NGSCB; codenamed Palladium and also known as Trusted Windows) was a cancelled software architecture designed by Microsoft which aimed to provide users of the Windows operating system with better privacy, security, and system integrity. NGSCB was the result of years of research and development within Microsoft to create a secure computing solution that equaled the security of closed platforms such as set-top boxes while simultaneously preserving the backward compatibility, flexibility, and openness of the Windows operating system. The primary stated objective with NGSCB was to "protect software from software."Part of the Trustworthy Computing initiative when unveiled in 2002, NGSCB was expected to be integrated with the Windows Vista operating system, then known by its codename "Longhorn." NGSCB relied on hardware designed by members of the Trusted Computing Group to produce a parallel operation environment hosted by a new kernel called the "Nexus" that existed alongside Windows and provide new applications with features such as hardware-based process isolation, data encryption based on integrity measurements, authentication of a local or remote machine or software configuration, and encrypted paths for user authentication and graphics output. NGSCB would also facilitate the creation and distribution of digital rights management (DRM) policies pertaining the use of information.The technology was the subject of much controversy during its development, with critics contending that it could be used to impose restrictions on users, enforce vendor lock-in, and undermine fair use rights and open-source software. NGSCB was first demonstrated by Microsoft in 2003 at the Windows Hardware Engineering Conference before undergoing a revision in 2004 that would enable applications written prior to its development to benefit from its functionality. In 2005, reports stated that Microsoft would scale back its plans so that the company could ship its Windows Vista operating system by its target date of 2006. Development of NGSCB spanned almost a decade before its cancellation, one of the lengthiest development periods of a feature intended for the operating system. NGSCB differed from the technologies that Microsoft billed as pillars of Windows Vista during development of the operating system, including Windows Presentation Foundation, Windows Communication Foundation, and WinFS, in that it was not built upon and did not prioritize .NET Framework managed code. While the technology has not fully materialized, aspects of NGSCB have emerged in Microsoft's BitLocker full disk encryption feature, which can optionally use the Trusted Platform Module to validate the integrity of boot and system files prior to operating system startup; the Measured Boot feature in Windows 8; the certificate attestation features in Windows 8.1; and the Device Guard feature of Windows 10.
Views: 6 wikipedia tts
Edgar Allan Poe | Wikipedia audio article
 
52:38
This is an audio version of the Wikipedia Article: Edgar Allan Poe Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. You can find other Wikipedia audio articles too at: https://www.youtube.com/channel/UCuKfABj2eGyjH3ntPxp4YeQ You can upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts "The only true wisdom is in knowing you know nothing." - Socrates SUMMARY ======= Edgar Allan Poe (; born Edgar Poe; January 19, 1809 – October 7, 1849) was an American writer, editor, and literary critic. Poe is best known for his poetry and short stories, particularly his tales of mystery and the macabre. He is widely regarded as a central figure of Romanticism in the United States and American literature as a whole, and he was one of the country's earliest practitioners of the short story. Poe is generally considered the inventor of the detective fiction genre and is further credited with contributing to the emerging genre of science fiction. He was the first well-known American writer to try to earn a living through writing alone, resulting in a financially difficult life and career.Poe was born in Boston, the second child of two actors. His father abandoned the family in 1810, and his mother died the following year. Thus orphaned, the child was taken in by John and Frances Allan of Richmond, Virginia. They never formally adopted him, but Poe was with them well into young adulthood. Tension developed later as John Allan and Poe repeatedly clashed over debts, including those incurred by gambling, and the cost of secondary education for Poe. He attended the University of Virginia but left after a year due to lack of money. Poe quarreled with Allan over the funds for his education and enlisted in the Army in 1827 under an assumed name. It was at this time that his publishing career began, albeit humbly, with the anonymous collection Tamerlane and Other Poems (1827), credited only to "a Bostonian". With the death of Frances Allan in 1829, Poe and Allan reached a temporary rapprochement. However, Poe later failed as an officer cadet at West Point, declaring a firm wish to be a poet and writer, and he ultimately parted ways with John Allan. Poe switched his focus to prose and spent the next several years working for literary journals and periodicals, becoming known for his own style of literary criticism. His work forced him to move among several cities, including Baltimore, Philadelphia, and New York City. In Richmond in 1836, he married Virginia Clemm, his 13-year-old cousin. In January 1845, Poe published his poem "The Raven" to instant success. His wife died of tuberculosis two years after its publication. For years, he had been planning to produce his own journal The Penn (later renamed The Stylus), though he died before it could be produced. Poe died in Baltimore on October 7, 1849, at age 40; the cause of his death is unknown and has been variously attributed to alcohol, "brain congestion", cholera, drugs, heart disease, rabies, suicide, tuberculosis, and other agents.Poe and his works influenced literature in the United States and around the world, as well as in specialized fields such as cosmology and cryptography. Poe and his work appear throughout popular culture in literature, music, films, and television. A number of his homes are dedicated museums today. The Mystery Writers of America present an annual award known as the Edgar Award for distinguished work in the mystery genre.
Views: 27 wikipedia tts
Towards a standardized testing plan and test tool suite for blockchain
 
03:39
I've been looking at, and thinking about, new blockchain and DLTs systems and platforms that are popping up all the time. Web publishing tools, grammar checkers, and template white papers mean that generally speaking you can no longer use simply assessment criteria like bad spelling, poor presentation or lack of background material to reject a new project as "probably a waste of time". As a result I find I have to actually dig into the substance of the proposed blockchain improvement, and this takes time. There are however a number of checkpoints that I use - do the project workers actually present an awareness of significant issues such as: what a consensus system is trying to achieve, have traditional attacks such as Sybil attacks been addressed, and are they using well-tested libraries for their cryptographic components. It would be nice if there was a simple centralized (yes, I get the irony) test package like Kali Linux and a menu of suitable tests to run through in order to assess the actual performance and reliability of these new projects. I guess it's just a matter of time, effort (and money) before one appears.
Views: 6 Thinklair
AI: perspectives and applications
 
01:36:09
CMSoft Talk: AI perspectives and applications CMSoft talks perspectives and applications of AI and parallel processing at ITA - Instituto Tecnológico de Aeronáutica for ITABits and ITAndroids audience, covering the following aspects: - Motivation: how do we learn? - Personal background - Quiz: what do we know? - Some real AI problems - Current AI research - Importance of Machine Learning - Parallel processing: a world of opportunities - Conclusion More information at: http://www.cmsoft.com.br Contact us: [email protected] Palestra CMSoft: perspectivas e aplicações de AI Palestra CMSoft sobre perspectivas e aplicações de inteligência artificial e processamento paralelo no ITA - Instituto Tecnológico de Aeronáutica para a ITABits e ITAndroids, sobre os seguintes temas: - Motivação: como nós aprendemos? - Background pessoal - Quiz: o que sabemos? - Alguns problemas reais em AI - Pesquisas sobre AI - Importância de aprendizado computacional - Processamento paralelo: um mundo de oportunidades - Conclusão Mais informações: http://www.cmsoft.com.br Entre em contato: [email protected]
Views: 1674 Douglas Andrade
What's new in Android security (M and N Version) - Google I/O 2016
 
45:40
Come learn about the protections we’ve put into Android M and N to make it our most secure version of Android yet. From verification of the boot process, to hardening of the runtime components, to more protections for your data while in transit, we’re helping you to protect your users at every layer of the platform and into your applications. As developers, learn about how to use new security APIs as well as best practices for protecting your data and keeping your app secure. Watch more Android talks at I/O 2016 here: https://goo.gl/Uv3jls See all the talks from Google I/O 2016 here: https://goo.gl/olw6kV #io16 #GoogleIO #GoogleIO2016
Views: 14849 Android Developers

Here!
Here!
Here!
Here!
Here!