Logo

    When Tech MIMICS Reality (SHA2017)

    August 06, 2017
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    Many of us are reliant on the digital communication tools and reference platforms that are created by companies. These platforms - some with more users than the population of any country - are controlled by proprietary algorithms, governed through binding Terms of Services (ToS), allow for access to third-party services. This talk will take stock of six intrusive forces that exploit invasive data collection that I have coined ‘MIMICS’: Manipulation (of our feeds and search results), Indexing (of our clicks, pageviews and social graphs), Monitoring (our content consumption patterns to shape future results), Interception (of data via upstream surveillance), Censorship (through arbitrarily enforced content moderation policies) and ‘Siloing’ (which forces users to keep their data within the walled gardens of a single platform). #Society #Politics #Legal #SurveillanceState about this event: https://c3voc.de

    Recent Episodes from Chaos Computer Club - SHA2017: Still Hacking Anyway (mp3)

    Can quantum physics break cryptography's curse? (SHA2017)

    Can quantum physics break cryptography's curse? (SHA2017)
    The history of cryptography is a history of failures. Stronger ciphers replaced broken ones, to be in turn broken again. Quantum cryptography is offering a hope to end this replacement cycle, for its security premises on the laws of quantum physics and not on limitations of human ingenuity and computing. But, can our nascent quantum technology implement quantum cryptography securely? The talk introduces today's quantum cryptography techniques, then shows how to compromise their security by exploiting imperfections in engineering implementations. #DeviceSecurity #Science #NetworkSecurity about this event: https://c3voc.de

    Biometric ID cards by the billion (SHA2017)

    Biometric ID cards by the billion (SHA2017)
    India has rolled out a 'voluntary' biometric ID card to all of its billion-plus citizens. Which is fascinating from a social, technical and fundamental rights perspective. This talk is about both intended and unintended consequences of this grand experiment, with a focus on the (implicit) assumptions we tend to make about technology. #Society #Privacy #SurveillanceState about this event: https://c3voc.de

    Hack-a-ble (SHA2017)

    Hack-a-ble (SHA2017)
    Although IoT is already embedded in our everyday lives, our security and privacy are sometime left behind for comfort and other reasons, despite the serious impact that IoT vulnerabilities may have on our digital and physical security. Bluetooth Low Energy (BLE), also known as Bluetooth Smart is the most popular protocol used for interfacing IoT and smart devices. Broadly used in the healthcare, fitness, security, and home-entertainment industries, nowadays we encounter BLE in almost every aspect of our lives (e.g. in wearables, sensors, medical devices, security products, etc.). In this lecture I will survey key security issues in the BLE protocol, as well as presenting a possible architecture for BLE Man-in-the-Middle (MitM) attack together with the related necessary equipment. In addition, will introduce some of the available tools and how they can be used to perform penetration-testing on BLE applications and will discuss possible mitigations to secure them. #NetworkSecurity #IoT about this event: https://c3voc.de
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io