Archive (Page 1 of 3)

2013 Internet Hall of Fame Inductee Interviews: James Galvin

The great­est threat to the secu­ri­ty and sta­bil­i­ty of our Internet today is dis­trib­uted attacks, dis­trib­uted denial of ser­vice attacks in par­tic­u­lar. The Internet was built on a foun­da­tion of it works because every­body because coop­er­ates and we all agree. And that was a great envi­ron­ment when you pret­ty much could name every­body who was on the Internet, or you you got to where you could name all the sites and you know, you could name all the organizations.

2013 Internet Hall of Fame Inductee Interviews: Ralph Droms

We’re at a time of huge expan­sion of the Internet out­side of the kinds of Internet con­nec­tions and devices that we’re famil­iar with. We’ve seen some of that over the past few years as we’ve moved from lap­tops, desk­top com­put­ers, to smart­phones and tablets and we’ve seen a big increase. Right now instead of a tablet and a lap­top at home, you’ve got a tablet, two iPhones, and a desk­top computer. 

2013 Internet Hall of Fame Inductee Interviews: Tracy Licklider

I think he would to some extent be sur­prised that busi­ness has hijacked the Internet in a cer­tain sense. That the enter­tain­ment industry…I’ll just pick on them but oth­er indus­tries too, that’ve basi­cal­ly exploit­ed that sort of deliv­ery vehi­cle that was made not real­ly with them in mind but they have gained such a dom­i­nant posi­tion in dic­tat­ing how and where the Internet goes. 

2013 Internet Hall of Fame Inductee Interviews: George Sadowsky

I would hope that ten or twen­ty years from now we live in a world in which Internet access is tak­en almost for grant­ed, and that it’s con­ceiv­able that the Internet—the name Internet”—will actu­al­ly fade and we’ll just con­sid­er it part of the infra­struc­ture that we’re used to just like you know, there’ll be a plug in the wall for infor­ma­tion ser­vices over the Internet.

Bob Lord Misinformation Keynote at DEF CON 27

I’m pret­ty ner­vous about the 2020 elec­tions. We’ve seen a lot of lit­tle deep­fakes here and there. And I sus­pect it’s not going to sur­prise you to say that I’m wor­ried that things are going to get far far worse and far more nuanced.

ASU KEDtalks: Solving the Unsolvable Problem

Today we face many high­ly com­plex chal­lenges both nation­al­ly and inter­na­tion­al­ly. From secu­ri­ty of our infor­ma­tion net­works, to plan­ning for and man­ag­ing nat­ur­al dis­as­ters, to emer­gence of new infec­tious dis­eases, to social and polit­i­cal con­flict through­out the world, these chal­lenges are messy, and high­ly interconnected.

Decentralize, Democratize, or Die

You might be more com­fort­able think­ing about deploy­ing math and code as your tac­tic, but I want to talk to you about the full suite of tac­tics that we use to effect change in the world. And this is a frame­work that we owe to this guy Lawrence Lessig.

Geek of the Week: Steve Crocker

The inter­est­ing phe­nom­e­non relat­ed to the RSA algo­rithm and is not shared with some of the oth­er algo­rithms is it is use­ful for both encryp­tion and for dig­i­tal sig­na­ture. That is they are two dis­tinct uses and this sin­gle algo­rithm is use­ful for both of those. And there’s an amaz­ing and some­what inter­est­ing sto­ry that then devel­ops from that.

Projecting the Future of Cyberspace

What we’re try­ing to do is to see over the hori­zons, look­ing at essen­tial­ly a five-year time frame, and iden­ti­fy what will be the cyber­se­cu­ri­ty land­scape in that context.

Hacking the Internet of Dongs
Hacking Sex Toys for Fun and Absolutely No Profit

A large num­ber of IoT research firms…yeah, they don’t want to look at this. Because there are stig­mas around sex. We have a very weird thing in North America about sex. We’ll watch all the vio­lence we want on tele­vi­sion but you can’t see two peo­ple have sex.

Page 1 of 3