Online shopping is where you get the deals, right? Maybe not. How big data, game theory, and behavioural psychology has created new opportunities to fix prices and rip you off (without you knowing it).
Get The Thoughty2 Book: http://bit.ly/thoughtybook JOIN The PRIVATE Thoughty2 Club & Get Exclusive Perks! http://bit.ly/t2club SUBSCRIBE - New Vids Every Thurs: http://bit.ly/thoughty2 Support me on Patreon: https://www.patreon.com/thoughty2
Thanks to The Patreon Research Team: David Davenport, Michael Mulligan, Jeff Li, Anais Namahoro, Noa
Thanks To My Patreon Supports: Gabriel Castillo, Jaclyn P Ray, Steve Bradshaw, Omar Albastaki, Elemeniah, Peter Hartman, Eirenliel Allier, pkipnis, Bart Post, JASON, Alex Miyazaki, Billy Carr, 7734reaper, Even Keiseraas, Robert Sopin, Alyson Strecker, Christian Pahl, Hugh o Goill, shane "MkII" ryan, Rachel Maxwell, Farid van der Zee, SolidSnake, Wade Melanson, Joshua Holdaway, Bluemelodie, Jose Bautista, Aijaz Shaikh, David Cruz, Joseph Worrall
Harvard professor Shoshana Zuboff wrote a monumental book about the new economic order that is alarming. "The Age of Surveillance Capitalism," reveals how the biggest tech companies deal with our data. How do we regain control of our data? What is surveillance capitalism?
In this documentary, Zuboff takes the lid off Google and Facebook and reveals a merciless form of capitalism in which no natural resources, but the citizen itself, serves as a raw material. How can citizens regain control of their data?
It is 2000, and the dot.com crisis has caused deep wounds. How will startup Google survive the bursting of the internet bubble? Founders Larry Page and Sergey Brin don’t know anymore how to turn the tide. By chance, Google discovers that the "residual data" that people leave behind in their searches on the internet is very precious and tradable.
This residual data can be used to predict the behavior of the internet user. Internet advertisements can, therefore, be used in a very targeted and effective way. A completely new business model is born: "surveillance capitalism."
Original title: De grote dataroof
Director: Roland Duong Research: Tom Reijner, Halil Ibrahim Özpamuk Camera: Adri Schrover Sound: Jochem Salemink Editing: Roland Duong, Paul Delput, Rinze Schuurman Production: Marie Schutgens …
The challenge of technology is that it does not standstill. Security institutions have had to adapt to everything from the moat to the printing press to the machine gun to the tank to the nuclear bomb. While nation-states have yet to initiate declared hostilities through cyberspace, adversaries flourish in the “gray space” below the level of outright conflict and appear undeterred in pursuing their goals. Foreign governments and non-state actors hack electric grid; they spread propaganda; they conduct targeted influence operations to foment mistrust. What new technologies are coming down the line to threaten our security, and how should our security institutions adapt? In this episode Jonathan and DJ talk to two of the world’s leading thinkers on the proliferation of online weapons – Richard Danzig, author, former Secretary of the Navy in the Clinton administration and Senior Fellow at Johns Hopkins Applied Physics Laboratory, and Kara Frederick, writer and Associate Fellow at the Center for a New American Security and a former intelligence professional and Facebook threat analyst.
Additional Reading Richard Fontaine and Kara Frederick, “The Autocrat’s New Toolkit,” Wall Street Journal, March 15, 2019, https://www.cnas.org/publications/commentary/the-autocrats-…
Original video: https://soundcloud.com/illumio/proliferation-richard-danzig-and-kara-frederick
Downloaded by http://huffduff-video.snarfed.org/ on Thu Jan 16 20:48:14 2020 Available for 30 days after download
How and why do humans take action against short-term threats, like terrorism, but struggle to respond when threats are more abstract, like climate change or cybersecurity? In this episode Jonathan heads to New York City and talks to Jason Healey, Senior Research Scholar at Columbia University’s School of International and Public Affairs, about how humanity has responded to climate change and cyber threats. Jonathan and Brandon Kirk Williams, a researcher at Illumio, open by introducing the thinking of Harvard psychologist Daniel Gilbert on cognition. Jay then offers proposals for cybersecurity risk management, drawing from his experience in the White House and working on global risk management at Goldman Sachs.
Daniel Gilbert on short-term vs. long-term threats https://www.npr.org/templates/story/story.php?storyId=5530483 https://www.latimes.com/archives/la-xpm-2006-jul-02-op-gilbert2-story.html
Jason Healey, A Fierce Domain: Conflict in Cyberspace, 1986-2012. https://www.amazon.com/Fierce-Domain-Conflict-Cyberspace-1986/dp/098932740X
Jason Healey and Rob Knake, Zero Botnets: Building a Global Effort to Clean up the Internet, Council on Foreign Relations, https://cfrd8-files.cfr.org/sites/default/files/report_pdf/CSR83_HealeyKnake_Botnets_0.pdf
Original video: https://soundcloud.com/illumio/1-cognition-jason-healey
Downloaded by http://huffduff-video.snarfed.org/ on Thu Jan 16 20:47:15 2020 Available for 30 days after download
Munich Cyber Security Conference 2019: Keynote by Dr. Alexander Evans OBE (Director Cyber, Foreign & Commonwealth Office)
Before the month of December turns to Yuletide festivities, I thought I’d tip my hat, as 2019 slips away, to a rip-roaring song celebrating the centenary of its world premiere this autumn - the first big hit for a young New York song plugger called
Matthew Rosenquist, Intel’s security strategist, talks with EEWeb’s Lou Covey about the North Korean government sponsored attacks on the US financial system and how AI might help.
Edward Snowden is an American whistleblower who copied and leaked highly classified information from the National Security Agency in 2013 when he was a Central Intelligence Agency employee and subcontractor. His new book "Permanent Record" is now available.
Original video: https://www.youtube.com/watch?time_continue=20&v=efs3QRr8LWw
Downloaded by http://huffduff-video.snarfed.org/ on Wed, 23 Oct 2019 12:52:52 GMT Available for 30 days after download
Speaker: Dr. Paul Vixie
Due to pervasive unpreparedness of users, applications, operating systems, and protocols, DNS has become an essential control point for “cyber” security. Most networks have a mix of legacy, modern, safe, and unsafe devices attached to them, and this condition won’t change as quickly as the Beyondcorp initiative might suggest. However, DNS is also an important control point for authoritarian regimes, and so “bypass” innovation is continuous, rapid, and ambitious. Here, Dr. Vixie pays special attention to the "bypass" innovation called “DNS over HTTP” or “DoH” protocol, now being strongly pushed by Mozilla, Cloudflare, and others, and outlines its problems and risks. In addition, a brief mention is made of IRTF Resolverless DNS.
Page 1 of 18Older