Archive (Page 2 of 2)

How to Overthrow a Government

I don’t want to live in a world where ISIS is scari­er than hack­ers, espe­cial­ly in 2016. We pre­vi­ous­ly held the title in 2013, 14, and 15. And to be hon­est I was a lit­tle bit dis­ap­point­ed when I saw this result. So I thought I’m in my 40s now, there’s a lot of young hack­ers in the audi­ence, and I’m not going to pass the baton to you guys unless we have that num­ber one spot back in our pile.

Is Digital Culture Responsible for Post-Truth Politics?

I’m going to argue today that even while we know post-truth pol­i­tics is hav­ing a ter­ri­ble effect on our polit­i­cal cul­ture and our role as cit­i­zens, it’s curi­ous­ly dif­fi­cult to com­bat it because of a set of beliefs about what pol­i­tics is, and about the Internet and the way it enables ordi­nary peo­ple to have a voice. And these beliefs inter­sect with a pre­vail­ing anti-intellectual anti-elitism which asso­ciates knowl­edge, dis­cern­ment, and truth with snob­bery and power.

Forbidden Research: Against the Law: Countering Lawful Abuses of Digital Surveillance

When I announced the talk on Twitter, some­body imme­di­ate­ly was like, Lawful abuse, isn’t that a con­tra­dic­tion?” But if you think about it for just a moment it might seem to be a lit­tle bit more clear. After all, the legal­i­ty of a thing is quite dis­tinct from the moral­i­ty of it.

Ask a Prison Librarian about Privacy, Technology, and State Control

What does it mean to be pri­vate when you’re in a place where you have no right to pri­va­cy but are iron­i­cal­ly deprived of the thing that makes your pri­va­cy go away?

Ingrid Burrington at Haunted Machines

I think there’s some­thing inter­est­ing about a dis­ci­pline that his­tor­i­cal­ly is tied to polit­i­cal intrigue, to secre­cy, being linked into this debate over what is good mag­ic or true divine mag­ic, and what is the work of demons. And I think there is some­thing inter­est­ing to be said about the moment we are in right now and how states them­selves kind of iden­ti­fy and invent exis­ten­tial threats to jus­ti­fy their own behavior.

Nobody Knows a Damn Thing

I’ve always been real­ly inter­est­ed in this idea of whether or not we can pre­dict hits. You speak to any­one who works in the enter­tain­ment indus­try, and every­one has their was sto­ries of that film they were sure was going to become a hit which some­how became a miss. There are niche films which appeal to every­one, and per­haps more like­ly, films that are designed to appeal to every­one which some­how appeal to no one.

Privacy, cen­sor­ship, and secu­ri­ty in the Middle East

So I got curi­ous, and I asked myself what is the Iranian Internet, and who is the Iranian user? I was pissed off enough, like I said, to take a step or to feel the urge to do some­thing. To feel the urge of mak­ing some­thing. And the thing that I real­ly want­ed to bring across was that cen­sor­ship is hap­pen­ing in a dif­fer­ent coun­try, where it’s being used to bring across infor­ma­tion, to make voic­es heard. 

Threat Modeling and Operational Security

I fig­ured I would give a pre­sen­ta­tion to bet­ter explain the work that I do and show, hope­ful­ly not too tech­ni­cal, but show how you can think about the way you go about your online life and the traces you leave online, and what this means for the work that you do, the peo­ple you inter­act with, and so on.

Page 2 of 2