Videos


Index


201120142015201620172018


2018


How tech companies deceive you into giving up your data and privacy

Finn Lützow-Holm Myrstad – TED

Have you ever actually read the terms and conditions for the apps you use? Finn Lützow-Holm Myrstad and his team at the Norwegian Consumer Council have, and it took them nearly a day and a half to read the terms of all the apps on an average phone. In a talk about the alarming ways tech companies deceive their users, Myrstad shares insights about the personal information you’ve agreed to let companies collect — and how they use your data at a scale you could never imagine.


What everyday citizens can do to claim power on the internet

Fadi Chehadé and Bryn Freedman – TED

Technology architect Fadi Chehadé helped set up the infrastructure that makes the internet work — essential things like the domain name system and IP address standards. Today he’s focused on finding ways for society to benefit from technology. In a crisp conversation with Bryn Freedman, curator of the TED Institute, Chehadé discusses the ongoing war between the West and China over artificial intelligence, how tech companies can become stewards of the power they have to shape lives and economies and what everyday citizens can do to claim power on the internet.


Today in Technology: Lessons on Protecting Privacy

Microsoft

In this installment of Today in Technology, Microsoft President Brad Smith and Communications Director Carol Ann Browne head to a former East German prison to see for themselves what this infamous symbol of the Cold War era can teach us today about the importance of protecting people’s privacy. The Stasi prison is a chilling example of what can happen when personal data falls into the wrong hands.


How to identify, avoid, and report phishing

Apple Support

Check out these tips to avoid phishing scams and learn what to do if you think that you’ve received a suspicious or fake email.


What your smart devices know (and share) about you

Kashmir Hill and Surya Mattu – TED

Once your smart devices can talk to you, who else are they talking to? Kashmir Hill and Surya Mattu wanted to find out — so they outfitted Hill’s apartment with 18 different internet-connected devices and built a special router to track how often they contacted their servers and see what they were reporting back. The results were surprising — and more than a little bit creepy. Learn more about what the data from your smart devices reveals about your sleep schedule, TV binges and even your tooth-brushing habits — and how tech companies could use it to target and profile you.


HTTPS and Web Security – The State of the Web

Google Chrome Developers

HTTPS is essential for site security, but it is also much more than that. In this episode, Rick talks with Emily Schechter, Product Manager on the Chrome Security team, about how HTTPS upholds identity, encryption, and integrity on the web. They also talk about how HTTPS has evolved and why the Chrome Security team believes the whole web should be HTTPS by default.


Sharing your Google data with Apps

Google

Learn about how you can share your Google data with apps to make your life easier — and what you can do to protect your personal information.


How not to get phished (like the DNC)

Vox

The Democratic National Committee was hacked because of a single email.


Google saves all your voice commands. Here’s how to delete them.

The Verge

Google is saving all of your previous conversations with the Assistant and Home devices. It’s not necessarily bad because this is how Google improves your voice model and suggestions – but if you don’t feel great about that embarrassing search you made, don’t worry. You can playback and delete all the voice recordings stored in your Google account. Here’s how.


Here’s Why Your Static Website Needs HTTPS

Troy Hunt

In one of many robust internet debates (as is prone to happen on Twitter), the discussion turned to the value proposition of HTTPS on a static website. Is it needed? Does it do any good? What’s it actually protecting?


How to read privacy policies like a lawyer

The Verge

Privacy policies are massive, daunting legal documents that can be complicated to understand. We called a couple lawyers to get their best tips on how to understand privacy policies without spending hours breaking down each line.


Surveillance and the City: Know When You’re Being Watched

Motherboard

Ingrid Burrington, author of “Networks of New York,” explains how big cities like New York are constantly under surveillance.


These tools can protect your online privacy

The Verge

You know how that one ad tracks you everywhere online? Here’s how to get rid of it, and a bunch of other things you can do to improve your privacy online.


GDPR: What Is It and How Might It Affect You?

The Wall Street Journal

The European Union’s General Data Protection Regulation on data privacy will come into force on May 25, 2018. This video explains how it could affect you, even if you don’t live in the EU.


How Do Two-Factor Code Generators Work?

Techquickie

Code generators for two-factor authentication can work without an Internet connection! How is that possible?


When Spies Come Home: Inside the Consumer Spyware Industry

re:publica

“I see you.” That’s the message Jessica received after her ex-husband planted spyware on her smartphone, giving up her location, messages, and much more. Our ‘When Spies Come Home’ investigative series into consumer malware, based on gigabytes of hacked data obtained from four spyware companies, reveals the scale of this industry: hundreds of thousands of ordinary people across the world have bought malware that can intercept emails, switch on microphones, steal WhatsApp messages, and more.


Chelsea Manning with Vogue’s Sally Singer

SXSW

Chelsea Manning changed the course of history when she released hundreds of thousands of government documents. Less than a year after being released from prison, she joins Vogue’s Sally Singer to discuss her new life, radical politics, and the consequences of unchecked state power.


OURSA 2018

Our Security Advocates Conference (OURSA)

OURSA 2018 was a one-day conference held on April 17, 2018 in San Francisco, dedicated to showcasing critical and emerging topics in security, privacy, and technology, presented by a diverse and inclusive set of experts. Each session focused on short talks from multiple specialists, followed by a moderated discussion.


Next-gen security with Windows Defender Antivirus

Microsoft

Learn about the next-gen approach to security in Windows Defender Antivirus on Windows 10.


Online Advertising: Crash Course Media Literacy #7

CrashCourse

You’re being watched. That sounded more sinister than I intended, but online, it’s true. Facebook, Instagram, Amazon, Netflix… the list goes on and on. They’re watching what you do, what you shop for, what you watch… all of it. And have you actually read the Terms of Service?


How Dark Patterns Trick You Online

Evan Puschak – Nerdwriter

Dark patterns are features of interface design crafted to trick users into doing things they might not want to do, but which benefit the business in question.


What Is Government Hacking?

Privacy International

Government hacking is unlike any other form of existing surveillance technique. Hacking is an attempt to understand a system better than it understands itself, and then nudging it to do what the hacker wants. Fundamentally speaking, hacking is therefore about causing technologies to act in a manner the manufacturer, owner or user did not intend or did not foresee.
Governments can wield this power remotely, surreptitiously, across jurisdictions, and at scale. A single hack can affect many people, including those who are incidental or unrelated to a government investigation or operation.


Passwords

The Checkout

Ben Jenkins takes Alex Lee on a supercalafragalistic expedition to find out the importance of strong passwords online.


The Psychology of Social Engineering

Niall Merrigan – NDC Conferences

Social Engineering is for most people a prince in a different part of the world offering them 50 billion dollars for an upfront fee of 5K. What can go wrong.
But hacking the human is more than that. Niall will show you some serious mind hacks, scams and various forms of social engineering in this engaging talk.


Should you cover your webcam?

The Verge

Webcams have presented a security liability for years, yet many of us don’t cover them up. Should we? Edward Snowden, Mark Zuckerberg, and former FBI director James Comey all seem to — but none of us are celebrities or heads of state, so what good does it do us?


I’m Pwned. You’re Pwned. We’re All Pwned.

Troy Hunt – NDC Conferences

Face it – it’s going to happen. It’s going to happen to you, it’s going to happen to your company and it’s definitely happened to me! Security incidents are now just a part of normal everyday online life and we need to adapt to the new reality.
In this talk, we’ll look at how security is changing and the things we can do to evolve our approaches in the era of the data breach.


2017


Identity Verification in a Post-Breach World

U.S. House Committee on Energy and Commerce

Data breaches are growing in both prevalence and size. The rate at which we willingly share personal data is also growing, particularly with an increasing proportion of the population being “internet natives” who’ve not known a time where we didn’t willingly share information online. Increasingly, the assumption has to be that everything we digitise may one day end up in unauthorised hands and the way we authenticate ourselves must adapt to be resilient to this.


Surveillance Self-Defense and Personal OpSec

Dragon Con

What you can do to protect yourself and your own communications by using encryption tools and practicing good ‘digital hygiene’.


You are not a Digital Native and that’s OK

Cory Doctorow – DEF CON

You may have heard people come up to you and say like, “Hey, you’re young. That makes you a digital native.” I’m here to tell you that you’re not a digital native. You make some good decisions and you make some bad decisions. But there’s one respect in which your use of computers is different from everyone else’s. And it’s that you are going to have to put up with the consequences of those uses of computers for a lot longer than the rest of us because we’ll all be dead.


Cryptography: Crash Course Computer Science #33

CrashCourse

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers.


The Cutting Edge of Human Rights

Alex Gladstein – Singularity University Summits

While there’s been a massive global industry to address problems like the lack of clean water and extreme poverty there’s been no coordinated effort waged against authoritarianism. Today 52% of the world’s population lives under an authoritarian regime. That’s about 4 billion people. This is one of the largest, if not the largest, problem affecting humanity today.


United for a Safer Cyberspace

Jaya Baloo – Singularity University Summits

We do have a bright future ahead of us. It’s a great place where we take all of our technology, we connect it together, and we have hyperconnectivity.
In the telecommunications industry we call this 5G. 5G means that we take all of these devices, we connect them to each other, and suddenly they are smart.
That’s great, right? Except it doesn’t actually work that way. Let’s take a look at how this vision actually translates for security.


Hackers & Cyber Attacks: Crash Course Computer Science #32

CrashCourse

Today we’re going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers—sometimes just amusement or curiosity, sometimes for money, and sometimes to promote social or political goals. Regardless, we’re not going to teach you how to become a hacker in this episode but we are going to walk you through some of the strategies hackers use to gain access to your devices, so you can be better prepared to keep your data safe.


Cybersecurity: Crash Course Computer Science #31

CrashCourse

Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible.


Pluralsight LIVE 2017: Troy Hunt, Cybersecurity Expert

Troy Hunt – Pluralsight

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security, an ASPInsider, and a full time Author for Pluralsight—a leader in online training for technology and creative professionals.


Google’s Heather Adkins on the Future of Data Security (Disrupt SF 2017)

TechCrunch

Frederic Lardinois talks to Google’s Heather Adkins about what really matters when it comes to keeping data secure, where AI fits in, and how ordinary citizens can keep safe.


The MVP Show Episode 4: Australia – Interview with Troy Hunt

Troy Hunt – Microsoft Channel 9

In this episode of the MVP Show, we are here in Gold Coast, Australia, to meet with Troy Hunt, a well-known security expert, and the person that made HaveIBeenPwned.com.


How to use a password manager

The Verge

If you’re using the same password over and over and over again, it’s about time you stop. Here’s how you can start securing your accounts — it’s a lot easier than you’d think.


Safety First

Mozilla

Keeping you & your digital loved ones secure.


5 common security mistakes you’re probably making

CNET

Learn from these errors to better protect yourself online.


Why encryption back doors are a bad idea

TechRepublic

Access Now’s U.S. Policy Manager Amie Stepanovich explains why a proposal by the Australian Prime Minister threatens the safety of data around the world.


Why The Government Shouldn’t Break WhatsApp

Tom Scott

Encryption backdoors – breaking WhatsApp and iMessage’s security to let the government stop Bad Things – sounds like a reasonable idea. Here’s why it isn’t.


Net Neutrality II

Last Week Tonight with John Oliver

Equal access to online information is once again under serious threat. John Oliver encourages internet commenters to voice their displeasure to the FCC by visiting http://www.gofccyourself.com and clicking “express” to file your comment.


The International State of Digital Rights, a Conversation with a UN Special Rapporteur

The Berkman Klein Center for Internet & Society

UN Special Rapporteur on the Right to Freedom of Opinion and Expression, David Kaye, is joined in conversation by Nani Jansen Reventlow, a Fellow at the Berkman Klein Center and Adviser to the Cyberlaw Clinic, about his upcoming thematic report on digital access and human rights, as well as the most burning issues regarding free speech online and digital rights including encryption, fake news, online gender-based abuse and the global epidemic of internet censorship.


Everything we know about Internet shutdowns

RightsCon

Government-ordered internet shutdowns nearly tripled in number between 2015 and 2016, harming human rights and economies worldwide. This session will offer a crash course in internet shutdowns with a global perspective, mapping out their causes and impacts; emerging trends; hotspots; new research on circumvention and economics; and who is fighting back to stop them.


The Scrapping Of Internet Privacy: Something We Can All Hate Together

The Late Show with Stephen Colbert

Stephen doesn’t recall any Americans marching in support of abolishing internet privacy. But if they did… victory!


National Cyber Security Centre (NCSC)

Emma W, People-Centred Security Lead from the NCSC, delivers her People: The Strongest Link keynote from the opening day of CyberUK in practice. In this keynote, Emma argues that the way to make security that works is to make security that works for people. Because security that doesn’t work for people, doesn’t work.


2016


Disrupt the revolution of cyber-threats with Windows 10

Microsoft

Disrupting the revolution of cyber-threats requires a platform with revolutionary security capabilities, and Windows 10 is rising to the occasion. In this session, we talk about technologies that can truly end the use of passwords and make multi-factor authentication the default, provide an easy to use and deploy data loss prevention (DLP) capability right in the platform, and technology that enables organizations to virtually eliminate malware threats to the Windows platform including those that come by way of the browser.


Mythbusting HTTPS (Progressive Web App Summit 2016)

Google Chrome Developers

HTTPS is a must-have for progressive web apps. “But,” you say, “it’ll make my site slow! And it’s going to cost a ton! And does it really give me any security benefits?” In this talk, we debunk some common myths and fears about HTTPS, show you why it’s an essential feature for progressive web apps, and dispense some tips and tricks for getting a shiny green lock on your site.


Troy Hunt at Techorama 2016

Troy Hunt – Microsoft

Troy is a Pluralsight author, Microsoft MVP and world-renowned internet security specialist. He spends his time teaching developers how to break into their own systems before helping to piece them back together to be secure against today’s online threats. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications. Troy regularly blogs at troyhunt.com from his home in Australia.


Technology explained: What is encryption?

BBC News

Encryption is a way of scrambling computer data so it can only be read by the people you want. It is an essential part of online shopping and banking, and can make emails and instant messages illegible if they are intercepted.


2015


Communications Surveillance

Privacy International

Are you a lawyer? An activist? A journalist? A doctor, teacher, parent, student, researcher, politician, or citizen? Communications surveillance affects you. This video is a high level overview of communications surveillance!


Edward Snowden on Passwords

Last Week Tonight with John Oliver

John Oliver and Edward Snowden talk password security.


2014


Why privacy matters

Glenn Greenwald – TED

Glenn Greenwald was one of the first reporters to see — and write about — the Edward Snowden files, with their revelations about the United States’ extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you’re “not doing anything you need to hide.”


Net Neutrality

Last Week Tonight with John Oliver

Cable companies are trying to create an unequal playing field for internet speeds, but they’re doing it so boringly that most news outlets aren’t covering it.
John Oliver explains the controversy and lets viewers know how they can voice their displeasure to the FCC.


2011


Beware online “filter bubbles”

Eli Pariser – TED

As web companies strive to tailor their services (including news and search results) to our personal tastes, there’s a dangerous unintended consequence: We get trapped in a “filter bubble” and don’t get exposed to information that could challenge or broaden our worldview. Eli Pariser argues powerfully that this will ultimately prove to be bad for us and bad for democracy.


Page last updated 7 October 2019
Precisely Private is also available as an eBook and a PDF.

Advertisements