Explore the foundations, instantiation, and applications of Reactive Garbling in this 21-minute conference talk by Jesper Buus Nielsen and Samuel Ranellucci at Asiacrypt 2016. Delve into reactive computation, garbling schemes, and their applications. Examine the security definitions, global view, and capabilities of Reactive Garbling Schemes (RGS) compared to traditional Garbling Schemes (GS). Learn about vectorised garbling, output encoding, and the linking algorithm. Understand the evaluation procedure, confidentiality aspects, and a toy example. Discover applications in reactive two-party computation, black-box watchlists, and techniques for enforcing input consistency and preventing selective failure attacks.