Posts Tagged ‘Privacy’

Unpacking Normal Box Theory | Perception of Normality is Everything | Guest Lee Jarvis | SDP171

[Podcast] Guest William Wesley Lee Jarvis returns to the show to discuss “Normal Box Theory”in society and how it applies to how people, and cultures in identifying the illusion of priorities. What is “thinking in averages?” Why is perception of normality everything? What are counter-processes and fixes? How do we analyze processes of culture relative…

Read More

Intellectual Property for the Everyday Internet User | Lee Jarvis | SDP153 Livestream 12-27-2020

[Podcast] Lee Jarvis is an Analyzer of Data Processes. He has much knowledge about intellectual property and critical considerations for bloggers, podcasters, social media influencers, and the person in charge of adding uplifting cartoons or images to the church bulletin.  What happens if you post a copyrighted image to your blog? How about streaming a…

Read More

Carl Hopf: EHS in the time of COVID | Bluetooth, PPE, and Biological Best Practices | SDP152 Livestream 11-24-2020

[Podcast] Has Apple or Google uploaded a COVID-19 tracking app to your phone without asking first? One million Coloradans have opted in to receive COVID-19 exposure notifications – now what? Could voluntary apps become part of unalterable operating systems? How exactly does Bluetooth work and what are the security risks with Bluetooth communications? What’s the…

Read More

The Dunning-Kruger Effect | What It Is And How To Fight It | Overton Window Has Shifted | LIVESTREAM 4-24-2020 [Podcast]

[Podcast] In the field of psychology, the Dunning–Kruger Effect is a cognitive bias in which people with low ability at a task overestimate their ability. It is related to the cognitive bias of illusory superiority and comes from the inability of people to recognize their lack of ability. Without the self-awareness of metacognition, people cannot…

Read More

SAFETY DOC PODCAST 64 – Browse Without Being Tracked | Security Analyst Trip Elix

PODCAST-Trip Elix has worked as an investigator and associated with business leaders along with the computer underground. He has been a computer forensic technician; security consultant, administrator, programmer, and system analyst, who has used or owned almost every version of every operating system since the 1980’s. He currently attends security conferences held by the computer underground…

Read More

My Tense Trip To The Dark Web – Risks & Rewards of TOR – SDP#42

“The dark web—which utilizes a technology created by military researchers in the 1990s to allow intelligence operatives to exchange information completely anonymously—is unknown to many. It’s been said to be a breeding ground for organized crime, sex traffickers, and hackers. But it’s also used by good actors, including whistle-blowers and activists.”

Read More