Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Digital Privacy
Showing:
122
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Stanford University
How Can Privacy Exist in a Data-Driven World? - Stanford Seminar
0
rewiews
Exploring privacy in a data-driven world through transparency tools, user studies, and artistic collaborations to reframe privacy as a societal value.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
media.ccc.de
Digitalcourage and Deutsche Post DHL Group - A Chronicle of Digital Coercion
0
rewiews
Chronik der Reaktionen der Deutschen Post DHL Group auf den BigBrotherAward 2023 für Digitalzwang, mit Einblicken in kuriose Entwicklungen und Ausweichmanöver des Unternehmens.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
media.ccc.de
Staatstrojaner for Past Crimes: Legal and Technical Challenges
0
rewiews
Analyse der aktuellen Probleme und rechtlichen Herausforderungen von Staatstrojanern in Deutschland, mit Fokus auf Prüfbarkeit, Datenschutz und verfassungsrechtliche Bedenken.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
TEDx
Dijital Dünyada Siber İstihbarat ve Beyin Takımı
0
rewiews
Siber güvenlik uzmanı Gökhan Yüceler, dijital ayak izlerimizin önemini ve siber istihbaratın gücünü vurgulayarak, başarılı bir "beyin takımı" kurmanın değerini paylaşıyor.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
TEDx
Colonialismo Digital - A Prática de Aprisionamento Tecnológico
0
rewiews
Exploração de dados pessoais por grandes plataformas digitais: impactos na privacidade, autonomia e liberdade. Análise crítica do modelo de negócios baseado em coleta e processamento de comportamentos online.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
TEDx
Czego nie widać w technologii? - Zaufanie, ostrożność i przełomy technologiczne
0
rewiews
Wykład o zaufaniu, ostrożności i przełomach w technologii. Mateusz Chrobok dzieli się spostrzeżeniami na temat bezpieczeństwa, sztucznej inteligencji i jej wpływu na nasze życie.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
media.ccc.de
Chat Control - EU's Surveillance Plans and Their Impact on Digital Rights
0
rewiews
Analyse der EU-Pläne zur Chat-Kontrolle: Auswirkungen auf Verschlüsselung, Privatsphäre und Grundrechte. Diskussion aktueller Entwicklungen und Handlungsmöglichkeiten gegen Überwachung.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
media.ccc.de
Introduction to Smartphone Malware Forensics
0
rewiews
Überblick über Techniken und Open-Source-Tools zur Erkennung von Malware auf iOS- und Android-Smartphones, mit Fokus auf Stalkerware und Staatstrojaner. Praktische Einführung in einvernehmliche Smartphone-Forensik.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
TEDx
Password: I nostri segreti protetti da '123456' - L'importanza delle password forti
0
rewiews
Esplorazione ironica del mondo delle password, evidenziando vulnerabilità comuni e l'importanza di pratiche di sicurezza robuste per proteggere i dati personali online.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
media.ccc.de
Chat Control - The Fight for End-to-End Encryption Is Not Over
0
rewiews
Rückblick auf den Kampf gegen die Chatkontrolle: Eine komplexe Auseinandersetzung um Überwachung, Kinderschutz und sichere Kommunikation. Aktuelle Entwicklungen und Ausblick auf zukünftige Herausforderungen.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
media.ccc.de
Staatliche Überwachung: Erfahrungen und Beispiele aus der Praxis
0
rewiews
Erfahre, wie staatliche Überwachung funktioniert und wie du dich als Aktivist*in schützen kannst. Lerne über Rechtsgrundlagen, technische Umsetzung und Gegenmaßnahmen.
Add to list
1
Lesons
1 hour 25 minutes
On-Demand
Free-Video
media.ccc.de
ELSTER - Nicht nur diebisch, sondern auch neugierig? - Datenschutz und DSGVO-Konformität des Steuererklärungssystems
0
rewiews
Untersuche die DSGVO-Konformität des Steuererklärungssystems ELSTER und erfahre mehr über Datenschutzbedenken, behördliche Interaktionen und Informationsfreiheitsanfragen.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Meta
Startups Rethinking Privacy - Lessons from Facebook's First Tech Hub
0
rewiews
Explore Facebook's Startup Garage initiative and discover how data startups are innovating in the privacy ecosystem, with key insights and lessons learned.
Add to list
5
Lesons
20 minutes
On-Demand
Free-Video
IEEE
WaveSpy - Remote and Through-Wall Screen Attack via mmWave Sensing
0
rewiews
Explores a novel screen attack method using mmWave sensing to remotely capture display content through walls, bypassing traditional security measures and demonstrating vulnerabilities in isolated environments.
Add to list
24
Lesons
16 minutes
On-Demand
Free-Video
Bugcrowd
Hackers Don't Wear Black Hoodies, They Wear Capes - Ethical Hacker Rights and Trust
0
rewiews
Explore ethical hacking rights, challenges, and the importance of trust in infosec. Learn why community collaboration is crucial for encouraging ethical hacking and protecting vulnerabilities.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Tales of Intimate Gender-Based Online Abuse in the Global South
0
rewiews
Exploring intimate gender-based digital violence in the Global South, focusing on Latin America. Examines abuser methods, societal factors, and lack of legal support, highlighting the need for global perspectives on online abuse.
Add to list
7
Lesons
19 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Contact Tracing Apps - Engineering Privacy in Quicksand
0
rewiews
Explore privacy challenges and solutions in contact tracing apps, focusing on end-to-end protection within complex ecosystems and overcoming obstacles in real-world implementation.
Add to list
11
Lesons
19 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Sex Work, Tech, and Surveillance - Panel Discussion
0
rewiews
Experts discuss technology's impact on sex workers' livelihoods, exploring digital security, privacy, and regulatory challenges in the evolving landscape of online sex work.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
USENIX Enigma Conference
The Browser Privacy Arms Race - Which Browsers Actually Protect Your Privacy?
0
rewiews
Comparative analysis of major browsers' privacy initiatives, exploring technical details and effectiveness in protecting user privacy on desktop and mobile platforms.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Protecting Journalists: Designing Secure Systems for All Users
0
rewiews
Explore how focusing on journalists' needs in security tool development can improve privacy and protection for all users, bypassing common objections and addressing real technical challenges.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Supreme Court's Van Buren Ruling on the CFAA - Implications and Analysis
0
rewiews
Explore the Supreme Court's Van Buren ruling on CFAA with legal experts, discussing its implications for access, privacy, and technology policy.
Add to list
19
Lesons
1 hour 32 minutes
On-Demand
Free-Video
Opening Keynote: Privacy in the Age of Surveillance
0
rewiews
Julia Angwin's keynote address explores cutting-edge developments in password security, digital privacy, and cybersecurity, offering insights for both professionals and everyday users.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Inside the World's Most Dangerous Search Engine - Shodan
0
rewiews
Explore the inner workings and potential risks of a powerful search engine with insights from its creator, delving into cybersecurity implications and technological advancements.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Search and Seizure in the US - Constitutional Rights and Legal Precedents - Part 1
0
rewiews
Explore constitutional rights, search and seizure laws, and privacy issues in the digital age. Learn about recent legal cases and their implications for personal freedoms and technology.
Add to list
17
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Anti-Forensics: Occult Computing Class
0
rewiews
Learn techniques to conceal digital activities, including data hiding, encryption, and steganography. Explore methods for thwarting forensic investigations and protecting privacy in the digital realm.
Add to list
1
Lesons
3 hours 7 minutes
On-Demand
Free-Video
The Aspen Institute
Is the Government Failing Us on Big Tech? - Regulation and Accountability in the Digital Age
0
rewiews
Explore the role of government regulation in Big Tech, examining the influence of major tech companies and the need for accountability in the digital age.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
The Aspen Institute
The Constitution and Supreme Court: Key Decisions and Impacts
0
rewiews
Neal Katyal discusses key Supreme Court cases, constitutional issues, and their impact on modern society, covering topics like privacy, affirmative action, and religious freedom.
Add to list
12
Lesons
20 minutes
On-Demand
Free-Video
The Aspen Institute
The Privacy Paradox - Balancing Convenience and Personal Data Control
0
rewiews
Explore practical strategies to regain control of your personal data online while balancing convenience and privacy in the digital age.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Joint Mathematics Meetings
Privacy in the Land of Plenty
0
rewiews
Explore privacy challenges in the era of big data and learn about innovative mathematical approaches to protect individual privacy while enabling data analysis.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
OWASP Foundation
Reflections on Scoping Trust in Modern Web Environments
0
rewiews
Reflections on trust in the modern web environment, examining gaps in current models and exploring ways to create a more trustworthy internet ecosystem without total self-reliance.
Add to list
15
Lesons
40 minutes
On-Demand
Free-Video
OWASP Foundation
Privacy and Security Risks in the Internet of Things
0
rewiews
Security researcher Ken Westin explores privacy risks in the Internet of Things, demonstrating how seemingly innocuous data can be exploited by criminals and how businesses can protect their customers' information.
Add to list
22
Lesons
31 minutes
On-Demand
Free-Video
Cooper
Cryptography and Legislation in France - Privacy Challenges and European Impact
0
rewiews
Exploration of France's stance on privacy and cryptography, examining restrictive laws, government positions, and their impact on the European Union's policies.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Cooper
Smartphone Apps: Let's Talk About Privacy
0
rewiews
Explore smartphone app privacy concerns and learn strategies to protect your personal data in this insightful talk by security researcher Axelle Apvrille.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
BSidesLV
What the Yandex Leak Reveals About Big Tech's Data Usage
0
rewiews
Explore the implications of the Yandex leak, revealing insights into big tech's data usage practices and the extent of user information collection and analysis.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
USENIX
Weaponizing Technology: Examining the Importance of Privacy in an Era of Digital Surveillance
0
rewiews
Exploring the impact of digital surveillance on privacy and reproductive rights post-Dobbs, emphasizing the vulnerability of marginalized communities and the need for protective measures.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Mozilla Hacks
The Future of the Internet - A Mozilla Perspective
0
rewiews
Explore Mozilla's vision for the internet's future, addressing challenges like closed systems, surveillance, and data privacy while discussing aspirations for a free and open web.
Add to list
15
Lesons
24 minutes
On-Demand
Free-Video
Mozilla Hacks
Designing for User-Centered Privacy
0
rewiews
Explore user-centric privacy research and its implications for browser design. Learn about misconceptions, cultural perspectives, and the importance of data protection in the digital age.
Add to list
29
Lesons
19 minutes
On-Demand
Free-Video
Forensic 365
Privacy and Security Issues on Social Media
0
rewiews
Explore privacy and security challenges in social media, focusing on user threats and awareness in the digital era. Learn about evolving risks and protective measures.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
HackerSploit
The Complete VeraCrypt Encryption Tutorial
0
rewiews
Learn to create encrypted volumes and secure drives using VeraCrypt in this comprehensive tutorial. Master essential data protection techniques for enhanced digital security.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Next-Generation SecureDrop - Protecting Journalists from Malware
0
rewiews
Explore SecureDrop's QubesOS-based workstation for journalists, enhancing protection against malware threats when handling sensitive leaked documents from anonymous sources.
Add to list
12
Lesons
19 minutes
On-Demand
Free-Video
Linux Foundation
Curtail Coercive Control Using Open Source Applications and Services
0
rewiews
Explore strategies to combat technology-enabled coercive control using open-source solutions. Learn design principles, privacy considerations, and challenges in addressing digital abuse.
Add to list
18
Lesons
36 minutes
On-Demand
Free-Video
RSA Conference
The Cybersecurity of Smart Adult Toys - Privacy and Security Challenges
0
rewiews
Explore privacy and security risks of smart adult toys, their impact on vulnerable groups, and the importance of holding manufacturers accountable for data protection.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
The Aspen Institute
Beyond the Clickbait - The Impact of AI on Cybersecurity
0
rewiews
Explore the nuanced impact of AI on cybersecurity with experts, examining potential benefits, risks, and strategies for individuals and organizations to navigate this evolving landscape.
Add to list
1
Lesons
1 hour 32 minutes
On-Demand
Free-Video
BSidesLV
Security Trek: The Next Generation - Teaching Resilience Beyond Data Security
0
rewiews
Explore the evolution of cybersecurity education, shifting focus from data protection to holistic resilience and recovery strategies for the next generation of security professionals.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Dave's Garage
Your Passwords Are in Danger - Why You Need a Password Manager Now
0
rewiews
Explore password security, learn about password managers, and discover how to protect your online accounts from potential breaches and hacking attempts.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
TED
The Arrest of Telegram CEO Pavel Durov and Its Implications for Tech Oversight and Free Speech
0
rewiews
Eli Pariser discusses Pavel Durov's arrest, exploring implications for tech oversight and free speech. This live conversation delves into the future of digital platforms and online democracy.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
TEDx
You Have Been Hacked - Understanding Digital Vulnerability and Cybercrime
0
rewiews
Explore digital vulnerabilities, hacker tactics, and the psychological impact of cybercrime. Gain insights into real-life cyber breaches and learn how to protect yourself in the digital age.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
NPTEL-NOC IITM
Introduction to Cyber Security - Part 3
0
rewiews
Explore fundamental concepts and principles of cybersecurity with Prof. Saji K Mathew in this comprehensive introduction to the field.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Communications Dos and Don'ts for Whistleblowers
0
rewiews
Essential communication strategies for whistleblowers: considerations, must-haves, pitfalls to avoid, and effective storytelling techniques to navigate this life-changing decision.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Awesome Open Source
Jami - An Open Source, Peer-to-Peer, Audio, Video, Conferencing, Chat, and Screen Sharing System
0
rewiews
Explore Jami: A peer-to-peer communication system offering audio/video calls, conferencing, chat, and screen sharing without servers. Learn installation, setup, and key features of this open-source alternative.
Add to list
13
Lesons
21 minutes
On-Demand
Free-Video
The Aspen Institute
Reddit: The Most Human Place on the Internet?
0
rewiews
Explore Reddit's unique approach to fostering human connection online, its content policies, and privacy protection measures with CEO Steve Huffman in this insightful discussion.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
The Aspen Institute
Reddit: 15 Years of Building Online Community
0
rewiews
Insights into Reddit's community-based model, history, and future vision from CEO Steve Huffman, discussing privacy, tech giants, and online political discourse.
Add to list
14
Lesons
46 minutes
On-Demand
Free-Video
TEDx
White Hat Lies - The Art of Online Safety
0
rewiews
Explore unconventional tactics for online safety, including using fake aliases and misinformation. Learn how to protect yourself from digital dangers and strengthen your privacy in today's interconnected world.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
Cloud Security Alliance
Tracing Origins - Navigating Content Authenticity in the Deepfake Era
0
rewiews
Explore the evolving landscape of content authentication and the C2PA initiative's role in combating deepfakes, from technical implementations to privacy challenges in our AI-driven world.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Mozilla Hacks
Privacy-Aware City Navigation with CityZen App - Open Source Exploration and OSM Contribution
0
rewiews
Explore cities privately with CityZen, an open-source app for navigation and OpenStreetMap contributions. Learn about its features, development, and ways to get involved.
Add to list
12
Lesons
25 minutes
On-Demand
Free-Video
ETHTaipei
Road to Compliant On-Chain Privacy with zkBob
0
rewiews
Explore the innovative zkBob protocol and its approach to achieving regulatory-compliant privacy solutions for blockchain transactions while maintaining decentralization and security standards.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
Messaging and Encryption - Fundamentals and Applications
0
rewiews
Explore messaging and encryption concepts, techniques, and applications in this comprehensive session on secure communication technologies.
Add to list
1
Lesons
1 hour 48 minutes
On-Demand
Free-Video
The Aspen Institute
How AI Can Work for Humanity - NextGen Report Launch and Discussion
0
rewiews
Experts discuss AI's impact on society, economy, and labor markets, exploring policies to address challenges and harness AI's potential for societal benefit while mitigating negative effects.
Add to list
17
Lesons
54 minutes
On-Demand
Free-Video
TheIACR
Eurocrypt 2022 Rump Session
0
rewiews
Engaging cryptography discussions featuring cutting-edge research, innovative ideas, and lighthearted presentations from leading experts in the field at Eurocrypt 2022.
Add to list
1
Lesons
3 hours 19 minutes
On-Demand
Free-Video
Encryption and Authentication: Passwords for All Reasons
0
rewiews
Learn about encryption and authentication passwords, exploring their differences, uses, and user expectations. Gain insights into key concepts and challenges in digital security.
Add to list
17
Lesons
36 minutes
On-Demand
Free-Video
TEDx
Algorithms - Uncovering the Hidden World of Social Media
0
rewiews
Descubre cómo los algoritmos de redes sociales manipulan y rastrean nuestras acciones en línea. Explora formas de recuperar el control de tu vida digital y desafía tu existencia en el mundo virtual.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
TEDx
Mastering Your Digital Destiny - The Power of Data Sovereignty
0
rewiews
Explore data sovereignty's crucial role in empowering communities, companies, and governments to control their digital futures, impacting privacy, cybersecurity, and geopolitical stability.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
TEDx
Trust in the Age of AI - Building Governance Frameworks
0
rewiews
Explore AI governance frameworks to harness opportunities while minimizing risks. Learn how trust and legal understanding can shape responsible AI development and implementation.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Limits of Individual Consent and Models of Distributed Consent in Online Social Networks
0
rewiews
Explore the limitations of individual consent and alternative models of distributed consent in online social networks, examining ethical implications and potential solutions.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
media.ccc.de
Weichenstellung
0
rewiews
Diskussion über die Zukunft der digitalen Welt, Datenschutz und Informationsfreiheit. Fokus auf Durchsetzung der DSGVO, Regulierung von Verbraucher-Scoring und Überwachungsbefugnisse der Sicherheitsbehörden.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
media.ccc.de
Re-ClaimID - A GNUnet Application for Self-Sovereign, Decentralised Identity Management and Personal Data Sharing
0
rewiews
Decentralized service for self-sovereign identity management and personal data sharing, offering privacy control and OpenID Connect compatibility through GNUnet's peer-to-peer framework.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Security BSides San Francisco
Anti-Privacy Anti-Patterns
0
rewiews
Exploring data collection practices, privacy implications, and the need for perspective shifts in digital privacy. Examines research findings, technological innovations, and the impact of seemingly harmless data.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
RSA Conference
Privacy by Design Lessons from Beyoncé
0
rewiews
Explore privacy engineering best practices and future trends through the lens of Beyoncé's approach, reflecting on GDPR's impact and emerging privacy regulations.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
BruCON Security Conference
Human Side-Channels and Their Implications for Security and Privacy
0
rewiews
Exploring non-physical human identifiers in digital security: forensic linguistics, behavioral signatures, and cultural references. Implications for tracking threat actors and privacy protection.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Protecting High Risk Users
0
rewiews
Exploring challenges in safeguarding high-risk individuals against cyber threats, focusing on targeted attacks, resource constraints, and real-world experiences in assisting vulnerable NGOs and persons.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
BSidesLV
How to Respond to Cops Who Want Your Passwords
0
rewiews
Learn strategies for protecting digital privacy when interacting with law enforcement, including legal rights, threat modeling, and best practices for device security at borders.
Add to list
19
Lesons
53 minutes
On-Demand
Free-Video
Collision Conference
Tech and Toys
0
rewiews
Explore the intersection of technology and toys with industry experts, discussing digital enhancements, privacy concerns, and innovative approaches to modern playtime.
Add to list
9
Lesons
21 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Should I Agree? Delegating Consent Decisions Beyond the Individual
0
rewiews
Explores delegating digital consent decisions to third parties, revealing public interest and context-dependent preferences for alternative decision mechanisms beyond individual control.
Add to list
11
Lesons
20 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Everyone Has Some Personal Stuff - Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh
0
rewiews
Explores a tiered privacy model for shared mobile devices in Bangladesh, addressing digital privacy challenges through separate 'shared' and 'secret' accounts. Findings reveal benefits and remaining hurdles in protecting personal data.
Add to list
8
Lesons
21 minutes
On-Demand
Free-Video
Security BSides San Francisco
The Underground Economy of Apple ID
0
rewiews
Explore the underground economy of Apple IDs, including real-world attacks, profit methods, and protective measures. Learn about vulnerabilities and Apple's mitigation efforts.
Add to list
31
Lesons
32 minutes
On-Demand
Free-Video
nullcon
Pretty Easy Privacy - Making Privacy The Default For Everyone
0
rewiews
Explore p≡p's innovative approach to automating digital privacy, making end-to-end encryption and anonymity the default for everyone, regardless of technical expertise.
Add to list
14
Lesons
43 minutes
On-Demand
Free-Video
RSA Conference
Biometric Data - Power, Promise and Privacy Challenges
0
rewiews
Explore the power, promise, and privacy challenges of biometric data in our digital society. Learn about risks, legal restrictions, and practical approaches to implementing this technology.
Add to list
11
Lesons
50 minutes
On-Demand
Free-Video
0xdade
Crossing the Border With Your Electronic Devices
0
rewiews
Explore legal and technological aspects of protecting digital privacy during border crossings, with insights on device security and traveler rights.
Add to list
26
Lesons
49 minutes
On-Demand
Free-Video
Black Hat
How Your E-book Might Be Reading You - Exploiting EPUB Reading Systems
0
rewiews
Uncover security vulnerabilities in e-book reading apps through analysis of EPUB format, revealing potential privacy risks and exploitation techniques across various platforms and devices.
Add to list
19
Lesons
35 minutes
On-Demand
Free-Video
Black Hat
A Survivor-Centric, Trauma-Informed Approach to Stalkerware
0
rewiews
Comprehensive overview of stalkerware, its impact, and survivor-centric approaches to support victims, emphasizing trauma-informed practices and ethical considerations.
Add to list
6
Lesons
22 minutes
On-Demand
Free-Video
Black Hat
Lights Off - The Darkness of the Smart Meters
0
rewiews
Explore security vulnerabilities in smart power meters, including remote control capabilities and potential risks. Learn about device reverse engineering and its implications for connected home technology.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Black Hat
An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs
0
rewiews
Exploring user perspectives on encryption methods, balancing security and usability in digital communications. Insights from a study on key-exchange vs. key-directory models for everyday messaging.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
media.ccc.de
OSINT - Ich weiß wo dein Haus wohnt
0
rewiews
Einführung in OSINT: Methoden zur Informationsgewinnung aus öffentlichen Quellen, Tools zur Bildanalyse und Lokalisierung, Sicherheitsaspekte beim Teilen persönlicher Daten im Internet.
Add to list
1
Lesons
1 hour 6 minutes
On-Demand
Free-Video
GOTO Conferences
Listening In - Cyber Security in an Insecure Age
0
rewiews
Explore the balance between digital security and law enforcement access in the modern age, examining real-world cases and their implications for privacy and cybersecurity.
Add to list
14
Lesons
54 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Beyond FBI vs Apple - What's Next for the Crypto Wars
0
rewiews
Exploring the ongoing crypto wars between technologists and law enforcement, focusing on privacy vs. security debates and strategies for protecting user data in the digital age.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
IEEE
Reading Between the Lines - An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems
0
rewiews
Comprehensive analysis of security and privacy risks in EPUB reading systems, exploring vulnerabilities and potential threats to user data and digital content protection.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
media.ccc.de
Cookiebanner, das Online-Werbe-Ökosystem und Google, Preisträger BigBrotherAwards 2021
0
rewiews
Einblicke in Googles Manipulation des Online-Werbemarktes, Auswirkungen auf Kreative und Medien, sowie Alternativen zur personalisierten Werbung. Kritische Analyse von Cookie-Bannern und deren Auswirkungen auf Nutzer.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
TEDx
Top Hacker Shows Us How It's Done
0
rewiews
Renowned hacker exposes vulnerabilities in everyday technology, from Bluetooth to credit cards, challenging assumptions about digital security and demonstrating the need for improved safeguards.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Black Hat
Why Is Anonymity So Hard?
0
rewiews
Explore the challenges of achieving online anonymity with expert Roger Dingledine, delving into technical complexities and potential solutions for privacy protection.
Add to list
1
Lesons
1 hour 19 minutes
On-Demand
Free-Video
GOTO Conferences
The Future of Security
0
rewiews
Explore the current state of cybersecurity, its challenges, and future directions. Learn how to shift towards more effective security practices and build technology with privacy by design.
Add to list
12
Lesons
42 minutes
On-Demand
Free-Video
Anti-Forensics for the Louise
0
rewiews
Explore anti-forensics techniques to protect digital privacy and evade detection, covering methods to conceal data and thwart forensic analysis.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Infojanitor - Virtual Trust, Virtual Permission and the Illusion of Security
0
rewiews
Explore virtual trust, permissions, and security illusions in digital environments, challenging assumptions and uncovering hidden vulnerabilities in information systems.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
On Defending Against Doxxing
0
rewiews
Learn strategies to protect personal information online and prevent doxxing attacks. Discover techniques for maintaining privacy and security in the digital age.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Intro and Hack the Future
0
rewiews
Explore cybersecurity frameworks, reputation in vendor support, and the intersection of digital and physical worlds. Gain insights on information value, complexity, and protecting digital assets.
Add to list
17
Lesons
55 minutes
On-Demand
Free-Video
Analogue Network Security
0
rewiews
Explore analogue network security concepts, from historical perspectives to modern applications, covering risk avoidance, physical security, time-based security, and trust in digital systems.
Add to list
36
Lesons
1 hour 39 minutes
On-Demand
Free-Video
Submersion Therapy - Phones and Privacy for Consumers
0
rewiews
Explore consumer device security and privacy, focusing on iOS, Android, Windows, and OS X. Learn about privacy settings, cloud services, and carrier considerations for informed decision-making.
Add to list
21
Lesons
50 minutes
On-Demand
Free-Video
Winning and Quitting the Privacy Game - What it REALLY Takes to Have True Privacy in the 21st Century
0
rewiews
Explore strategies for achieving genuine privacy in the digital age, examining challenges and practical solutions for protecting personal information in the modern world.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Using Technology to Defend Digital Privacy Human Rights
0
rewiews
Learn to protect digital privacy using technology. Explore threats, risk assessment, secure browsing, anonymous operating systems, VPNs, and secure messaging to safeguard your online presence and human rights.
Add to list
27
Lesons
58 minutes
On-Demand
Free-Video
Broken Arrow
0
rewiews
Explore digital security threats and practical defense strategies for personal data protection in various online platforms and everyday technologies.
Add to list
18
Lesons
46 minutes
On-Demand
Free-Video
linux.conf.au
Democratising Higher Education with OERs and FOSS
0
rewiews
Explore how open educational resources and free software democratize higher education, focusing on the Open Education Resource Foundation's innovative approach and technology stack.
Add to list
18
Lesons
42 minutes
On-Demand
Free-Video
load more...