Săptămâna trecută dedicam lista noastră de weekend prețului pe care îl plătim tehnologiei, trecând prin zombie digitali și rehab tehnologic. Rămânem pe firul acestui subiect, și vorbim tura asta despre intimitate și încercările nereușite de protecție a ei, de la demersurile companiilor și cele ale autorităților, la filtrele personale. Mai jos, o listă de video-uri despre GDPR, riscul conexiunii continue, hacking, curiozitate, siguranță și tendința de a uita care sunt granițele proprietății asupra propriei vieți.
Privacy and data protection
Understanding Privacy in the Digital Age - Full Episode
The idea of “privacy” has undergone significant changes in the digital age, as has the idea of privacy “harm.” Legislation, both at home and abroad, hasn’t kept pace with technological developments, leaving some wondering if privacy as we know it is long dead.
Facebook Is 'Too Big.' Facebook Co-Founder Chris Hughes Tells Us Why | NYT Opinion
Facebook’s co-founder, Chris Hughes, is calling to break-up the company. The company has grown too big and too powerful, and is posing a threat to democracy, the economy, and privacy. In this video op-ed, Hughes argues that there are two simple steps that could right the ship for Americans.
Zuckerberg's EU testimony: what he didn't answer
Mark Zuckerberg appeared before the European Parliament on May 22 to testify about Facebook's impact on society, from data privacy to elections. Though Zuckerberg faced tough questions from members of Parliament, the format allowed him to escape easily. Here are the key questions Zuckerberg left unanswered.
Glenn Greenwald: Why privacy matters
Glenn Greenwald was one of the first reporters to see — and write about — the Edward Snowden files, with their revelations about the United States' extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you’re “not doing anything you need to hide."
GDPR: What Is It and How Might It Affect You?
What is the GDPR? | A summary of the EU GDPR
What exactly is the GDPR all about? And what does it mean for data subjects and businesses? What do you need to do? And why should you?
GDPR explained: How the new data protection act could change your life
The General Data Protection Regulation, known as GDPR, is set to reform data protection in the UK and the EU, and even across the world. It aims to prevent huge data breaches and leaks - like what happened with the Facebook data scandal.
How data brokers sold my identity | Madhumita Murgia | TEDxExeter
How much of our personal data is held by companies to be traded for profit? Madhumita Murgia decided to investigate and was shocked by what she found out. The FT’s European technology correspondent argues it’s time for us to wake up and reclaim our identities.
Cyber Self-Defense | Paul Carugati | TEDxSpokane
Stop Clicking! Paul Carugati will provide insights about the current “threat landscape” on the internet and how to stay safe in a dynamic environment.
Cybersecurity every day | Jaya Baloo | TEDxRotterdam
Jaya Baloo will dive into cybersecurity and its impact on our daily lives. Her vision: United for a safer cyber space! Jaya Baloo is the Chief Information Security Officer (CISO) of KPN in the Netherlands. She was recently recognized as one of the top 100 CISO's globally. Working in the information security arena for the past 18 years, she has worked mostly for global telecommunications companies such as Verizon and France Telecom. Jaya is also a frequent speaker at security conferences on subjects around lawful interception, mass surveillance, and cryptography
Confessions of a Cyber Spy Hunter: Eric Winsborrow at TEDxVancouver
With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, a company that is developing stealth cyber security technology solutions. Eric and his company are at the forefront of the latest developments in the world of global espionage, and the merging of man and machine. He attests that the Hollywood-created image of the daring secret agent sneaking into a foreign government's laser protected server room to steal top secret information couldn't be further from modern reality. In fact, the "James Bond" of the 21st century doesn't just use a computer, he is the computer.
Why Google won't protect you from big brother: Christopher Soghoian at TEDxSanJoseCA 2012
Dubbed the Ralph Nader for the Internet Age by Wired Magazine, Christopher Soghoian is a researcher and advocate focused on improving privacy protections for individuals. He is particularly interested in how companies choose to either resist or facilitate surveillance of their customers. Soghoian has used the Freedom of Information Act as well as several other, unconventional investigative methods to shed light on the scale and methods of the U.S. government to spy on Internet communications and mobile telephones.
Your smartphone is leaking your information | Bram Bonné | TEDxGhent
This talk was given at a local TEDx event, produced independently of the TED Conferences. Bram is a PhD student in computer science at the Expertise Centre for Digital Media at Hasselt University, where he specializes in computer security and privacy. During his PhD, he developed an interest in privacy-sensitive information leaking from smartphones and laptops. At TEDxGhent 2014, he will scare you by showing the information that is available to anyone willing to listen. But don’t worry, he will also explain what you can do to prevent privacy-sensitive information from leaking.
Why we should rethink our relationship with the smartphone | Lior Frenkel | TEDxBG
This talk was given at a local TEDx event, produced independently of the TED Conferences. Lior Frenkel explains why being hooked to our Smartphones is the most interesting - yet silent - addiction of our times. Supposing the Smartphone is here to stay, he urges us to become aware of the addiction - and discuss how a digital diet should look like - a moment before technology becomes a part of our physical bodies.
TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a book on his experiences since this event.
The risk of connectivity: Hacking our watches, fridges, guns and more | Avi Rubin | TEDxMidAtlantic
Everything seems to be connected to the Internet these days, from our watches to our fridges to our cars. There are even internet-connected guns. But security is often overlooked in our quest for more features, leaving us vulnerable to hackers. Avi Rubin shares some scary stories of our devices being hacked, and tells us what we need to do to protect ourselves.
How Online Trackers Track You, and What You Can Do About It | Luke Crouch | TEDxUniversityofTulsa
Luke Crouch presents the reality of what online tracking is capable of today, and how pervasive it is in our online presence. However, he also shows how easy it is to fool some of the online trackers, and take our privacy online back.
A Story about fishing, hacking and theft | Glen Gooding | TEDxStHildasSchool
Cyber security! We are responsible for protecting ourselves from organised crime. Glen is the Business Unit Executive of IBM’s Security Services Division.
He has the responsibility for bringing IBM’s world-class services business to the forefront in Australia and New Zealand. A leadership role that encompasses: Sales; Marketing; Consulting & Systems Integration; and Solution Design. Previously, he was the Director of IBM’s Institute for Advanced Security. Glen brings over 25 years of industry based experience to the IBM team, holding leadership roles at business and development levels both in Australia and in the United States. He is an IBM Certified Executive IT Specialist and also an Open Group Distinguished IT Specialist.
Why I teach people how to hack | Ýmir Vigfússon | TEDxReykjavík
Ýmir tells us why he teaches his students how to hack and how understanding hacking gives an insight into computer security and the best mindset to react to attacks.
Ýmir is an assistant professor at Reykjavík University, Ph.D. in computer science, entrepreneur and hacker.
Hacking 101: Frank Heidt at TEDxMidwest
"Hacking 101"! Frank Heidt, one of the world's foremost authorities on cyber security, gives the audience the gift of "straight talk" regarding how companies and people get hacked every day and how to avoid becoming a victim.
State Sanctioned Hacking - The Elephant in the Room: Frank Heidt at TEDxMidwest
Frank Heidt, cyber defense professional, offers a sobering historic, economic and demographic overview of the growing threat to the U.S. from Chinese cyber invasions. Heidt mixes humor with intellect as he places the audience on "high alert" through stories of espionage and intrigue.
Frank Heidt is one of the world's top computer security experts. He is a recognized expert in the fields of Information Assurance, Network Security, and Systems Penetration. He has worked for the Department of Defense and is an expert at information warfare. He has been a visiting lecturer at the United States Army War College, United States Navy War College and the Naval Post Graduate School Monterey on the subject of defensive information warfare and military computer systems security.
TEDxDUBLIN - Josh Klein - Hacking Work
Joshua Klein will hack anything that moves -- his list includes "social systems, computer networks, institutions, consumer hardware and animal behavior." His latest book Hacking Work launched in the US on September 23rd, 2010.
Hackers are all about curiosity, and security is just a feeling | Chris Nickerson | TEDxFultonStreet
Chris offers a peek inside the mind and world of hackers — people who like to tinker, usually for public benefit. Want to feel more secure? Know what it takes to hack your cell phone? Why don't corporations listen when they're warned? Oh, yeah, and have you learned how to pick locks yet? Remember to face the world as a child does - with with the wonder of a child discovering a new thing for the first time.
Internet of Things (IoT) | What is IoT | How it Works | IoT Explained | Edureka
Internet of Things Security | Ken Munro | TEDxDornbirn
Ken Munro shows us how insecure Internet of Things products are and how easy it is to hack them. The big question is: how can we use these products in a safe way? Ken Munro is a specialist in ethical hacking. He is able to hack everything – from hotel keycards, to a range of IoT devices, from wearable tech to children’s toys and smart home control systems.
The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon
Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all.
The Future of Your Personal Data - Privacy vs Monetization | Stuart Lacey | TEDxBermuda
Big data is big business and as value is created from customer insight - but, where is the moral line? What happens when companies cross that line? What if consumers could flip the equation to offer their data directly to the companies they trust? The future could be customer monetized data.
The Future of Data Protection: Adapting to the Privacy Imperative