49:38
Nymwars Fighting For Anonymity And Pseudonymity On The Net
Nymwars: Fighting for Anonymity and Pseudonymity on the Internet Eva Galperin The last yea...
published: 09 Aug 2012
author: Decomas
Nymwars Fighting For Anonymity And Pseudonymity On The Net
Nymwars Fighting For Anonymity And Pseudonymity On The Net
Nymwars: Fighting for Anonymity and Pseudonymity on the Internet Eva Galperin The last year has seen an Internet-wide debate over real names, pseudonyms, and...- published: 09 Aug 2012
- views: 109
- author: Decomas
1:01
Google+ real name policy sparks nym wars
http://www.nma Internet users are used to being able to create aliases and even complete a...
published: 23 Aug 2011
author: NMAWorldEdition
Google+ real name policy sparks nym wars
Google+ real name policy sparks nym wars
http://www.nma Internet users are used to being able to create aliases and even complete alter egos online. However, Google Plus is cracking down on anonymit...- published: 23 Aug 2011
- views: 9319
- author: NMAWorldEdition
55:19
Shmoocon 2013 - Beyond Nymwars - Online Identity Battle
...
published: 24 May 2013
author: HackersOnBoard
Shmoocon 2013 - Beyond Nymwars - Online Identity Battle
Shmoocon 2013 - Beyond Nymwars - Online Identity Battle
- published: 24 May 2013
- views: 4
- author: HackersOnBoard
49:31
"What's in a name?" #nymwars and the public sphere
Last year's #nymwars have brought the discussion about names and what they mean online to ...
published: 29 Jun 2012
"What's in a name?" #nymwars and the public sphere
"What's in a name?" #nymwars and the public sphere
Last year's #nymwars have brought the discussion about names and what they mean online to a new high: While one group strongly supports "real names" claiming them to leading to better conversations and transparence the opposite fraction fights tooth and nail against it championing the right to anonymity and whistleblowing. In this talk we'll start by clearly separating the different -nymities from each other and look - in that light - at the different fraction's arguments. What's really in a name and is anonymity a viable base for communication? This talk was held at the SIGINT12 conference in Cologne https://program.sigint.ccc.de/fahrplan/events/31.html- published: 29 Jun 2012
- views: 115
1:00
Google+ Infinity: A 100 Word Science Fiction Story Inspired by the Nymwars
A 100 Word Science Fiction Story Inspired by the Nymwars....
published: 31 Aug 2011
author: Botgirl Questi
Google+ Infinity: A 100 Word Science Fiction Story Inspired by the Nymwars
Google+ Infinity: A 100 Word Science Fiction Story Inspired by the Nymwars
A 100 Word Science Fiction Story Inspired by the Nymwars.- published: 31 Aug 2011
- views: 55
- author: Botgirl Questi
0:59
Freaks: A Hundred Word Sci-Fi Story Inspired by the Nymwars
A Hundred Word Sci-Fi Story Inspired by the Nymwars....
published: 31 Aug 2011
author: Botgirl Questi
Freaks: A Hundred Word Sci-Fi Story Inspired by the Nymwars
Freaks: A Hundred Word Sci-Fi Story Inspired by the Nymwars
A Hundred Word Sci-Fi Story Inspired by the Nymwars.- published: 31 Aug 2011
- views: 14
- author: Botgirl Questi
5:03
nymwars what's it all about
Using avatar kinect and voice to discuss whether we need to know who we are online or not....
published: 29 Aug 2011
nymwars what's it all about
nymwars what's it all about
Using avatar kinect and voice to discuss whether we need to know who we are online or not. The answer is not yes or no, not binary- published: 29 Aug 2011
- views: 134
1:09
Goddess of Perpetual Memory: :A 100 Word Science Fiction Story Inspired by the Nymwars
A Hundred Word Science Fiction Story about the Nymwars....
published: 31 Aug 2011
author: Botgirl Questi
Goddess of Perpetual Memory: :A 100 Word Science Fiction Story Inspired by the Nymwars
Goddess of Perpetual Memory: :A 100 Word Science Fiction Story Inspired by the Nymwars
A Hundred Word Science Fiction Story about the Nymwars.- published: 31 Aug 2011
- views: 25
- author: Botgirl Questi
62:15
The Power Of Names - How We Define Technology And How Technology Defines Us
2012-11-10 - Phreaknic16 - 16 - Aestetix - The Power Of Names - How We Define Technology A...
published: 12 Nov 2012
author: phreaknicstaff
The Power Of Names - How We Define Technology And How Technology Defines Us
The Power Of Names - How We Define Technology And How Technology Defines Us
2012-11-10 - Phreaknic16 - 16 - Aestetix - The Power Of Names - How We Define Technology And How Technology Defines Us After getting suspended twice from Goo...- published: 12 Nov 2012
- views: 8
- author: phreaknicstaff
54:09
HOPE Number 9 2012 Why Names Matter
As the Internet becomes more public and universal, the world is beginning to have an ident...
published: 13 Oct 2012
author: aestetix
HOPE Number 9 2012 Why Names Matter
HOPE Number 9 2012 Why Names Matter
As the Internet becomes more public and universal, the world is beginning to have an identity crisis. Some big questions are coming up: who are we, and how s...- published: 13 Oct 2012
- views: 168
- author: aestetix
64:33
What is in a name? - Identity-Regimes from 1500 to the 2000s [28C3]
What is in a name? Identity-Regimes from 1500 to the 2000s Starting with the history of bi...
published: 29 Dec 2011
author: CCCen
What is in a name? - Identity-Regimes from 1500 to the 2000s [28C3]
What is in a name? - Identity-Regimes from 1500 to the 2000s [28C3]
What is in a name? Identity-Regimes from 1500 to the 2000s Starting with the history of birth-registration an overview on the historical regimes of naming an...- published: 29 Dec 2011
- views: 496
- author: CCCen
11:45
Cash Online (Chaum's Anonymity)
First talk in a series on crypto currency, focusing on David Chaum's ingenious invention f...
published: 03 Dec 2013
Cash Online (Chaum's Anonymity)
Cash Online (Chaum's Anonymity)
First talk in a series on crypto currency, focusing on David Chaum's ingenious invention for paying anonymously on the Internet. We describe how digital payments happen without anonymity, and then we discuss the mechanism for blind signatures that guarantees the desired anonymity for any purchase on the Web.- published: 03 Dec 2013
- views: 32
Youtube results:
50:13
CCC-TV - Sigint12 - Das Konzept "Dingfabrik+" - Lars Weiler (DE) Kölner Fablab Dingfabrik
Das Konzept "Dingfabrik+"
Das Fablab als Teil der urbanen Infrastruktur
Wir stellen das K...
published: 20 Oct 2013
CCC-TV - Sigint12 - Das Konzept "Dingfabrik+" - Lars Weiler (DE) Kölner Fablab Dingfabrik
CCC-TV - Sigint12 - Das Konzept "Dingfabrik+" - Lars Weiler (DE) Kölner Fablab Dingfabrik
Das Konzept "Dingfabrik+" Das Fablab als Teil der urbanen Infrastruktur Wir stellen das Konzept "Dingfabrik+", wie das erste Kölner Fablab Dingfabrik in die urbane Infrastruktur integriert wird. Es geht dabei um die Erweiterung des Angebots für Bastler, Schulen, Hochschulen, Wirtschaftsförderung und die lokale Industrie. Lars Weiler Official website : http://media.ccc.de/browse/conferences/sigint12- published: 20 Oct 2013
- views: 8
89:00
Anonymity Systems Requirements and Architecture
Anonymity Systems Requirements and Architecture, by Steven Murdoch
Anonymity systems are ...
published: 09 Sep 2013
Anonymity Systems Requirements and Architecture
Anonymity Systems Requirements and Architecture
Anonymity Systems Requirements and Architecture, by Steven Murdoch Anonymity systems are one of the most challenging classes of security technologies to build and deploy. This talk will describe the types of systems which are available and difficulties encountered in realising these goals. As a case study, the talk will use the largest deployed anonymity network, Tor. Learning Objectives: + Types of anonymity systems and their design requirements + Challenges in building anonymity systems + Understand how Tor works This lecture was delivered at SecAppDev 2013 by Steven Murdoch. Steven J. Murdoch is a researcher in the Security Group of the Cambridge University Computer Laboratory, working on the Tor Project. His research interests include covert channels, banking security, anonymous communications, and censorship resistance. Following his PhD studies on anonymous communications, he worked with the OpenNet Initiative, investigating Internet censorship. Currently he is working for the Tor Project, on improving the security and usability of the Tor anonymity system. He is also working on analyzing the security of banking systems especially Chip & PIN/EMV, and is Chief Security Architect of Cronto, an online authentication technology provider.- published: 09 Sep 2013
- views: 3
55:47
ICANN's New gTLD Program Security Stability Governance
ICANN's New gTLD Program: Implications on Security, Stability, and Governance Alexander Ur...
published: 09 Aug 2012
author: Decomas
ICANN's New gTLD Program Security Stability Governance
ICANN's New gTLD Program Security Stability Governance
ICANN's New gTLD Program: Implications on Security, Stability, and Governance Alexander Urbelis The Internet is about to rapidly expand. Through ICANN's new ...- published: 09 Aug 2012
- views: 170
- author: Decomas
6:00
Solution to Google+ and YouTube Comments Integration Anonymity "Problem"
This is an easy way to post anonymously on youtube without creating a new Google+ account....
published: 11 Nov 2013
Solution to Google+ and YouTube Comments Integration Anonymity "Problem"
Solution to Google+ and YouTube Comments Integration Anonymity "Problem"
This is an easy way to post anonymously on youtube without creating a new Google+ account.- published: 11 Nov 2013
- views: 37