Logo

    154

    Explore " 154" with insightful episodes like "#154 Serie Oráculo: Tercer mensaje del Universo", "Making the Leaks Flow on a Budget (gpn21)", "Making the Leaks Flow on a Budget (gpn21)", "Making the Leaks Flow on a Budget (gpn21)" and "Making the Leaks Flow on a Budget (gpn21)" from podcasts like ""Tu éxito es inevitable con Maïté Issa", "Chaos Computer Club - recent events feed (high quality)", "Chaos Computer Club - recent events feed", "Chaos Computer Club - recent events feed (low quality)" and "Chaos Computer Club - recent audio-only feed"" and more!

    Episodes (43)

    #154 Serie Oráculo: Tercer mensaje del Universo

    #154 Serie Oráculo: Tercer mensaje del Universo

    En este tercer episodio del podcast Oráculo traigo un mensaje de una de  las mujeres que más me ha inspirado y a la que considero mi maestra yogui: Dona Fari. 
    He elegido uno de los principios que tiene en su libro y que habla de un tema muy potente: del cuerpo y de cómo separamos cuerpo y mente sin dejar que el flujo de sabiduría mente-cuerpo, cuerpo-mente se conecte. 

    Todo esto tiene que ver con cómo tratamos las mujeres a nuestro cuerpo. Por eso, la práctica de este episodio tiene aún más fuerza. Te propongo un ejercicio para encarnar esta sabiduría y llevarla a tu vida para manifestar mejor y, por supuesto, para reconectar con la naturaleza de tu cuerpo. 

    Estoy deseando leerte, Manifestadora. Cuéntame cómo ha ido esta experiencia y qué te ha parecido este aprendizaje del podcast.

    Making the Leaks Flow on a Budget (gpn21)

    Making the Leaks Flow on a Budget (gpn21)
    How to create and run your own secure leaking platform that actually works, communicate securely with sources and distribute large datasets on a fraction of the budget of WikiLeaks. With the WikiLeaks organization in disarray due to the ongoing extradition hearing of Julian Assange, their website slowly falling apart due to lack of technical staff, their submission portal not functioning since the beginning of 2022, and in theme of the conference theme of "cheap alternatives," - this is a talk for those who care about the leaks continuing to flow and are interested in setting up and running their own secure leaking platform as an alternative to WikiLeaks that still works, on a fraction of their former (and current) budget, while learning from the various mistakes they made during their history. I will go over setting up a Wiki instance on anonymous, censorship-resistant hosting, how to communicate with sources and handle data submissions securely, and how to distribute massive datasets using the BitTorrent protocol, all-using widely available open-source free software solutions. about this event: https://cfp.gulas.ch/gpn21/talk/YC7XVF/

    Making the Leaks Flow on a Budget (gpn21)

    Making the Leaks Flow on a Budget (gpn21)
    How to create and run your own secure leaking platform that actually works, communicate securely with sources and distribute large datasets on a fraction of the budget of WikiLeaks. With the WikiLeaks organization in disarray due to the ongoing extradition hearing of Julian Assange, their website slowly falling apart due to lack of technical staff, their submission portal not functioning since the beginning of 2022, and in theme of the conference theme of "cheap alternatives," - this is a talk for those who care about the leaks continuing to flow and are interested in setting up and running their own secure leaking platform as an alternative to WikiLeaks that still works, on a fraction of their former (and current) budget, while learning from the various mistakes they made during their history. I will go over setting up a Wiki instance on anonymous, censorship-resistant hosting, how to communicate with sources and handle data submissions securely, and how to distribute massive datasets using the BitTorrent protocol, all-using widely available open-source free software solutions. about this event: https://cfp.gulas.ch/gpn21/talk/YC7XVF/

    Making the Leaks Flow on a Budget (gpn21)

    Making the Leaks Flow on a Budget (gpn21)
    How to create and run your own secure leaking platform that actually works, communicate securely with sources and distribute large datasets on a fraction of the budget of WikiLeaks. With the WikiLeaks organization in disarray due to the ongoing extradition hearing of Julian Assange, their website slowly falling apart due to lack of technical staff, their submission portal not functioning since the beginning of 2022, and in theme of the conference theme of "cheap alternatives," - this is a talk for those who care about the leaks continuing to flow and are interested in setting up and running their own secure leaking platform as an alternative to WikiLeaks that still works, on a fraction of their former (and current) budget, while learning from the various mistakes they made during their history. I will go over setting up a Wiki instance on anonymous, censorship-resistant hosting, how to communicate with sources and handle data submissions securely, and how to distribute massive datasets using the BitTorrent protocol, all-using widely available open-source free software solutions. about this event: https://cfp.gulas.ch/gpn21/talk/YC7XVF/

    Making the Leaks Flow on a Budget (gpn21)

    Making the Leaks Flow on a Budget (gpn21)
    How to create and run your own secure leaking platform that actually works, communicate securely with sources and distribute large datasets on a fraction of the budget of WikiLeaks. With the WikiLeaks organization in disarray due to the ongoing extradition hearing of Julian Assange, their website slowly falling apart due to lack of technical staff, their submission portal not functioning since the beginning of 2022, and in theme of the conference theme of "cheap alternatives," - this is a talk for those who care about the leaks continuing to flow and are interested in setting up and running their own secure leaking platform as an alternative to WikiLeaks that still works, on a fraction of their former (and current) budget, while learning from the various mistakes they made during their history. I will go over setting up a Wiki instance on anonymous, censorship-resistant hosting, how to communicate with sources and handle data submissions securely, and how to distribute massive datasets using the BitTorrent protocol, all-using widely available open-source free software solutions. about this event: https://cfp.gulas.ch/gpn21/talk/YC7XVF/

    EP 154: Fundamentals — How to Go on a Bouldering Trip

    EP 154: Fundamentals — How to Go on a Bouldering Trip

    Fundamentals (Part 2 of 6) — In part 2 of this series, Jesse and I dive deeper into specific tips and pitfalls for going on a bouldering trip. We covered a wide range of topics including training and preparation, crash pad and kit recommendations, how to manage skin and energy, good bouldering ethics, how to boulder in a group, and much more.

    Listen to more Fundamentals episodes!

    thenuggetclimbing.com/fundamentals

    Jesse’s Original Episode:

    EP 127: Jesse Firestone

     

    Check out Grasshopper Climbing!

    grasshopperclimbing.com

    instagram.com/grasshopperclimbing

    Tell them I sent you to save $500 off a fully kitted out 8'x10' Grasshopper board! 

    Check out Rhino Skin Solutions!

    rhinoskinsolutions.com

    Use code “NUGGET” at checkout for 20% off your next order!

    Check out Petzl!

    petzl.com

    Or shop for Petzl quickdraws at your local climbing shop!

     

    We are supported by these amazing BIG GIVERS:

    • Leo Franchi, Michael Roy, David Lahaie, Robert Freehill, Jeremiah Johnson, Scott Donahue, Eli Conlee, Skyler Maxwell, Craig Lee, Mark and Julie Calhoun, and Yinan Liu

     

    Become a Patron:

    patreon.com/thenuggetclimbing

    Show Notes:  

    thenuggetclimbing.com/episodes/fundamentals-part-2

    Nuggets:

    (00:00:00) – Intro

    (00:04:22) – A favorite memory from Jesse’s trip to Rocklands, and my week-long trip to Bishop in 2017

    (00:11:12) – Top out views

    (00:12:06) – Jesse’s Tip #1: Try to have a mix of crash pads

    (00:16:55) – Steven’s Tip #1: Make your preparation as specific as possible

    (00:20:21) – Bonus Tip: Two things that people miss in their bouldering training

    (00:22:51) – Steven’s Tip #2: Decide really quickly whether or not the boulder you’re trying is important for you (and have an intention for the trip and each climbing day)

    (00:24:56) – Bonus Tip: Be mindful of the language that you use with yourself (e.g. “I should be able to do this.”)

    (00:25:35) – Jesse’s Tip #2: Organize your gear and car before your trip (and stash some emergency snacks in your bag!)

    (00:30:01) – Steven’s Tip #3: Bring everything you think you might need to the boulders

    (00:32:41) – Jesse’s Tip #3: Know basic bouldering ethics, and know how to move efficiently in a group (and be polite at the boulders)

    (00:35:01) – Steven’s Tip #4: Take breaks to run around and look at cool stuff

    (00:36:28) – Bonus Tip: Take your climbing shoes off between every try

    (00:36:49) – Steven’s Tip #5: Sleep on a decent bed (and bring your pillow!)

    (00:39:06) – Steven’s Pitfall #1: Blowing through all of your skin on day 1

    (00:40:22) – Jesse’s Pitfall #1: Getting socially exhausted (i.e. be mindful of how much social energy you have)

    (00:41:46) – Steven’s Pitfall #2: Spending the whole day “warming up” to do the hard thing

    (00:42:59) – Bonus Tip: Learn how to warm up with minimal climbing (and be ruthlessly realistic about how much time you have and what you can do in a day)

    (00:44:35) – Jesse’s Pitfall #2: Not being mindful of how much total energy you have

    (00:46:45) – Steven’s Pitfall #3: Blowing it with timing when it comes to conditions and sun/aspect

    (00:48:02) – Bonus Tip: Try to find out when your project goes into the shade

    (00:48:26) – Jesse’s Pitfall #3: Not taking responsibility for your own safety

    (00:52:40) – Jesse’s Top Tip: Know good bouldering ethics

    (00:53:23) – Steven’s Top Tip: Decide quickly whether the bouldering you are trying is important to you

    Bring Your Own IDentity (MCH2022)

    Bring Your Own IDentity (MCH2022)
    Thanks to DNSSEC and DANE, it is possible to automatically verify user@domain.name identities by checking with domain.name servers. The real problem however, is integration with existing protocols, instead of inventing something completely new and perhaps web-only. The purpose of our work on Realm Crossover mechanisms has been to design generic solutions that extend many different application protocols, without changing their protocol specs. For clients, being able to control an online identity is not just a cool matter of adding their domain name at the end. It also means that they control how long the identity exists, if it is an alias, if it can be a group account with members that they control. (We made identity and access control libraries to support all that, along with identities that are only usable until a timeout, from a certain remote domain, under a particular communication topic, and so on.) For servers, being able to authenticate users from any domain is an answer to many questions that otherwise stagnate: * Why does every HTTP server want us to create an account under its domain, instead of letting us use our own? * Why do we constantly need to confirm our email address by clicking links? * Why not authenticate SMTP senders and subject others to the most stringent spam filtering? * Why not publish a mailing list archive in IMAP, available only to subscribers and searchable with their own tooling? * Why not use AMQP as an automation-friendly document push protocol with authenticated senders for form submission, bill processing, blog publications, document archiving, ... * Why not share your MQTT dataflow with external parties, so they don't need to keep a web page open to be notified about, say, a newly posted document? * Why not share your PGP keys and contact information in your own LDAP directory but with access control to decide who may see what? All these questions stagnate on problems like *You would need to have accounts for all users in the World*. So that is what we solved in this project. This project expands the usefulness of many protocols by changing the way their implementations handle authentication; instead of local accounts, they follow a backlink to the client's domain. We designed and built the extensions needed for the backend, and made a few first implementations. We are hoping to show the usefulness of adopting these ideas in your own tooling. We present a number of generic mechanisms for Realm Crossover: 1. SASL tokens can be relayed to a Diameter server under the domain.name; 2. Kerberos supports Realm Crossover, and a keying handshake can do this on-demand; 3. X.509 certificates and PGP keys can be assured with DANE-akin structures for clients or by a lookup in an LDAP server for domain.name. For each, some form of domain-owned identity provider is run to assert identity when an external service needs it. The level of security is a matter of the user and their domain.name; an external service should not have to force down the security level of the client's domain. These three Realm Crossover mechanisms cover the majority of application protocols, the notable exceptions being the oldest ones, like Telnet, FTP and HTTP. Specifically for HTTP, we have defined an authentication mechanism that adds SASL; this means that new security mechanisms can be defined in SASL, where it benefits many protocols; it also means that authentication shifts from the HTTP application to the server, where the coding environment is better suited for such responsibilities. We end with a demo, showcasing a useful authentication flow: * Client desktop, with FireFox and a HTTP-SASL plugin * Server domain, running Apache with HTTP-SASL module under an independent domain * Server identity client, using Diameter to relay SASL to the Client Domain * Client Domain, running an identity provider with SASL over Diameter about this event: https://program.mch2022.org/mch2022/talk/NMNWQB/

    Bring Your Own IDentity (MCH2022)

    Bring Your Own IDentity (MCH2022)
    Thanks to DNSSEC and DANE, it is possible to automatically verify user@domain.name identities by checking with domain.name servers. The real problem however, is integration with existing protocols, instead of inventing something completely new and perhaps web-only. The purpose of our work on Realm Crossover mechanisms has been to design generic solutions that extend many different application protocols, without changing their protocol specs. For clients, being able to control an online identity is not just a cool matter of adding their domain name at the end. It also means that they control how long the identity exists, if it is an alias, if it can be a group account with members that they control. (We made identity and access control libraries to support all that, along with identities that are only usable until a timeout, from a certain remote domain, under a particular communication topic, and so on.) For servers, being able to authenticate users from any domain is an answer to many questions that otherwise stagnate: * Why does every HTTP server want us to create an account under its domain, instead of letting us use our own? * Why do we constantly need to confirm our email address by clicking links? * Why not authenticate SMTP senders and subject others to the most stringent spam filtering? * Why not publish a mailing list archive in IMAP, available only to subscribers and searchable with their own tooling? * Why not use AMQP as an automation-friendly document push protocol with authenticated senders for form submission, bill processing, blog publications, document archiving, ... * Why not share your MQTT dataflow with external parties, so they don't need to keep a web page open to be notified about, say, a newly posted document? * Why not share your PGP keys and contact information in your own LDAP directory but with access control to decide who may see what? All these questions stagnate on problems like *You would need to have accounts for all users in the World*. So that is what we solved in this project. This project expands the usefulness of many protocols by changing the way their implementations handle authentication; instead of local accounts, they follow a backlink to the client's domain. We designed and built the extensions needed for the backend, and made a few first implementations. We are hoping to show the usefulness of adopting these ideas in your own tooling. We present a number of generic mechanisms for Realm Crossover: 1. SASL tokens can be relayed to a Diameter server under the domain.name; 2. Kerberos supports Realm Crossover, and a keying handshake can do this on-demand; 3. X.509 certificates and PGP keys can be assured with DANE-akin structures for clients or by a lookup in an LDAP server for domain.name. For each, some form of domain-owned identity provider is run to assert identity when an external service needs it. The level of security is a matter of the user and their domain.name; an external service should not have to force down the security level of the client's domain. These three Realm Crossover mechanisms cover the majority of application protocols, the notable exceptions being the oldest ones, like Telnet, FTP and HTTP. Specifically for HTTP, we have defined an authentication mechanism that adds SASL; this means that new security mechanisms can be defined in SASL, where it benefits many protocols; it also means that authentication shifts from the HTTP application to the server, where the coding environment is better suited for such responsibilities. We end with a demo, showcasing a useful authentication flow: * Client desktop, with FireFox and a HTTP-SASL plugin * Server domain, running Apache with HTTP-SASL module under an independent domain * Server identity client, using Diameter to relay SASL to the Client Domain * Client Domain, running an identity provider with SASL over Diameter about this event: https://program.mch2022.org/mch2022/talk/NMNWQB/

    Psychological party tricks (emf2022)

    Psychological party tricks (emf2022)
    As a psychologist, I often get asked one of two questions: Can you read my mind? Are you analysing me?* But Psychology is not entirely useless; by studying the mind and brain, we can learn a lot about how we work. In this talk, I will go through some psychological party tricks and tell us about how we understand the world around us. Some of these mind tricks have been around for ages, but hopefully, they will make for an interesting (even fun) way to pass the time and present an opportunity to learn about yourself. *(The answers are No and No - Unless you pay me a lot of money to retrain as a therapist.) about this event: https://c3voc.de

    Psychological party tricks (emf2022)

    Psychological party tricks (emf2022)
    As a psychologist, I often get asked one of two questions: Can you read my mind? Are you analysing me?* But Psychology is not entirely useless; by studying the mind and brain, we can learn a lot about how we work. In this talk, I will go through some psychological party tricks and tell us about how we understand the world around us. Some of these mind tricks have been around for ages, but hopefully, they will make for an interesting (even fun) way to pass the time and present an opportunity to learn about yourself. *(The answers are No and No - Unless you pay me a lot of money to retrain as a therapist.) about this event: https://c3voc.de

    Psychological party tricks (emf2022)

    Psychological party tricks (emf2022)
    As a psychologist, I often get asked one of two questions: Can you read my mind? Are you analysing me?* But Psychology is not entirely useless; by studying the mind and brain, we can learn a lot about how we work. In this talk, I will go through some psychological party tricks and tell us about how we understand the world around us. Some of these mind tricks have been around for ages, but hopefully, they will make for an interesting (even fun) way to pass the time and present an opportunity to learn about yourself. *(The answers are No and No - Unless you pay me a lot of money to retrain as a therapist.) about this event: https://c3voc.de

    Psychological party tricks (emf2022)

    Psychological party tricks (emf2022)
    As a psychologist, I often get asked one of two questions: Can you read my mind? Are you analysing me?* But Psychology is not entirely useless; by studying the mind and brain, we can learn a lot about how we work. In this talk, I will go through some psychological party tricks and tell us about how we understand the world around us. Some of these mind tricks have been around for ages, but hopefully, they will make for an interesting (even fun) way to pass the time and present an opportunity to learn about yourself. *(The answers are No and No - Unless you pay me a lot of money to retrain as a therapist.) about this event: https://c3voc.de

    Filthy Five Breakdown of 154! Stevenson vs Herring | Lomachenko: Commey or Haney? | Jermall Charlo ready to move to 168 for Caleb Plant?

    Filthy Five Breakdown of 154!  Stevenson vs Herring |  Lomachenko: Commey or Haney? | Jermall Charlo ready to move to 168 for Caleb Plant?

    Filthy Five Breakdown of 154!  Stevenson vs Herring |  Lomachenko: Commey or Haney? | Jermall Charlo ready to move to 168 for Caleb Plant? 

    Do you agree with our #1 at Junior Middleweight??   We want to hear it!

    Tune in for all this and more on Brews and Boxing!

    Youtube.com/BrewsandBoxing

    Digitales Ehrenamt meets Deutsche Stiftung fuer Engagement und Ehrenamt (rc3)

    Digitales Ehrenamt meets Deutsche Stiftung fuer Engagement und Ehrenamt (rc3)
    None Seit dem Sommer 2020 gibt es in Deutschland eine Bundesstiftung fuer die Foerderung von Ehrenamt und Engagement. Wir treffen Katarina Peranić, Vorstaendin der Stiftung, um uns mit ihr darueber auszutauschen, was Zukunft, Technologie und Ehrenamt miteinander verbindet, welche Ziele die Stiftung verfolgt und wie man eigentlich mit einer Institution im Aufbau 23 Millionen Euro Foerdergelder an Tausende Projekte in nur wenigen Wochen ausschuettet, um die Digitalisierung ehrenamtlichen Engagements in der Pandemie zu unterstuetzen. Das Gespraech fuehren wir via Videokonferenz aus dem gemeinwohlorientierten Video- und Tonstudio des Verstehbahnhofs Fuerstenberg/Havel, das in nur 8 Wochen mit Foerderung aus eben diesem Programm aufgebaut wurde. Stream: https://streaming.media.ccc.de/rc3/wikipaka about this event: https://cfp.verschwoerhaus.de/rc3-2020/talk/RYN3WW/

    Digitales Ehrenamt meets Deutsche Stiftung fuer Engagement und Ehrenamt (rc3)

    Digitales Ehrenamt meets Deutsche Stiftung fuer Engagement und Ehrenamt (rc3)
    None Seit dem Sommer 2020 gibt es in Deutschland eine Bundesstiftung fuer die Foerderung von Ehrenamt und Engagement. Wir treffen Katarina Peranić, Vorstaendin der Stiftung, um uns mit ihr darueber auszutauschen, was Zukunft, Technologie und Ehrenamt miteinander verbindet, welche Ziele die Stiftung verfolgt und wie man eigentlich mit einer Institution im Aufbau 23 Millionen Euro Foerdergelder an Tausende Projekte in nur wenigen Wochen ausschuettet, um die Digitalisierung ehrenamtlichen Engagements in der Pandemie zu unterstuetzen. Das Gespraech fuehren wir via Videokonferenz aus dem gemeinwohlorientierten Video- und Tonstudio des Verstehbahnhofs Fuerstenberg/Havel, das in nur 8 Wochen mit Foerderung aus eben diesem Programm aufgebaut wurde. Stream: https://streaming.media.ccc.de/rc3/wikipaka about this event: https://cfp.verschwoerhaus.de/rc3-2020/talk/RYN3WW/
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io