Posts Tagged ‘Privacy’
Intellectual Property for the Everyday Internet User | Lee Jarvis | SDP153 Livestream 12-27-2020
[Podcast] Lee Jarvis is an Analyzer of Data Processes. He has much knowledge about intellectual property and critical considerations for bloggers, podcasters, social media influencers, and the person in charge of adding uplifting cartoons or images to the church bulletin. What happens if you post a copyrighted image to your blog? How about streaming a…
Read MoreCarl Hopf: EHS in the time of COVID | Bluetooth, PPE, and Biological Best Practices | SDP152 Livestream 11-24-2020
[Podcast] Has Apple or Google uploaded a COVID-19 tracking app to your phone without asking first? One million Coloradans have opted in to receive COVID-19 exposure notifications – now what? Could voluntary apps become part of unalterable operating systems? How exactly does Bluetooth work and what are the security risks with Bluetooth communications? What’s the…
Read MoreNew First Amendment Playbook | Big Tech Censorship | What You Need to Know | Livestream 11-12-2020
[Podcast] Doc unpacks how 2020 was the year that mass media and big tech fogged the American people and became the gatekeepers of the First Amendment. People are measuring their words or waking up to an unchallengeable revocation of their social media platforms (just ask Mike Glover). It’s time for a sober reckoning of considerations…
Read MoreThe Dunning-Kruger Effect | What It Is And How To Fight It | Overton Window Has Shifted | LIVESTREAM 4-24-2020 [Podcast]
[Podcast] In the field of psychology, the Dunning–Kruger Effect is a cognitive bias in which people with low ability at a task overestimate their ability. It is related to the cognitive bias of illusory superiority and comes from the inability of people to recognize their lack of ability. Without the self-awareness of metacognition, people cannot…
Read MoreSAFETY DOC PODCAST 64 – Browse Without Being Tracked | Security Analyst Trip Elix
PODCAST-Trip Elix has worked as an investigator and associated with business leaders along with the computer underground. He has been a computer forensic technician; security consultant, administrator, programmer, and system analyst, who has used or owned almost every version of every operating system since the 1980’s. He currently attends security conferences held by the computer underground…
Read MoreMy Tense Trip To The Dark Web – Risks & Rewards of TOR – SDP#42
“The dark web—which utilizes a technology created by military researchers in the 1990s to allow intelligence operatives to exchange information completely anonymously—is unknown to many. It’s been said to be a breeding ground for organized crime, sex traffickers, and hackers. But it’s also used by good actors, including whistle-blowers and activists.”
Read More