Jane McGonigal; ‘How to Think (and Learn) Like a Futurist; Keynote SXSWedu on YouTube; 2016-03-09; video: 1:08:59.
The Four Skills
- personal forecasts
- Play with the future (simulate it)
- Characteristics of creative individuals
- Some technqiues for creativity
- De Bono’s six thinking Hats.
state transition from mode X to mode Y.
- Amplification & diminution
what if it becomes more so.
- Is this what “we” want?
Jelly Bean (Analogy) Theory
- Primes (primitives)
- 3D Printing of Food
- Virtual Reality
- Behavioral persuasion (in VR); i.e. smell-o-ivision.
- Something about Environmental Impact of one’s food.
- Personal life mangement.
- Societal stewardship.
- Superstruct, a game
- Dilbert Blockchain
- Blockchain for Social Good;; a whitepaper; Media Lab, Massachusetts Institute of Technology (MIT); WHEN?
Jane McGonigal; The future is dark (and that is a good thing); At TEDxSkoll, on YouTube; 2017-04-21; video 18:58.
Laura Galante; How To Exploit Democracy; TED Talk; 2017-04; 09:33.
Am I Being Spied On?; Phil Polstra; at DEF CON 22; 2014-08-22; 0:42:03.
Ame Elliot (Simply Secure); Privacy and Threat in Practice: Mobile Messaging by Low-Income New Yorkers; Presented at the 25th USENIX Security Symposium; 2016-08-10→12; with video
- Design Director, Simply Secure, a charity
- ex-design research lead, IDEO, San Francisco, CA
- ex-research scientist, Xerox PARC
- ex-staff, Ricoh Innovations
- Ph.D. University of California, Berkeley (UCB)
something about <quote>creating hybrid physical-digital interactions to support the architectural design process.
- 8 patents
- a plurality of (peer reviewed & invited) publications
- Chapter in Oxford Handbook of Internet Psychology, Oxford University Press; 2007-05-17; 518 pages; Amazon:019956180X: Kindle: $52, paper: $22+SHT.
- Various awards
Is a theoretically-secure system any good if it doesn’t address users’ real-world threat models? Is the security community today meeting the needs of a mass, global audience, or simply building tools and features for itself? Do we know how to understand what people really need?
We asked a group of straight-talking New Yorkers about the data-security threats they face. Their answers indicate a significant gap between their lived experience and the way our community thinks about security. To bridge this gap and get privacy-preserving systems into the hands of real people, we need more foundational research to understand user needs, not only late-stage usability studies in a lab.
Through in-context interviews in homes, restaurants, and libraries, our study gained insights into a world of constant surveillance experienced by a group of low-income African-Americans. They shared specific examples of how their phone is threatened at home, work, and on the street. This talk shares our participants’ threat models. From shoulder-surfing, to catfishing, to how a “renter’s mindset” develops around handsets controlled by adversarial telecom providers, understanding privacy and threat in practice has far-reaching implications for the future of information security.
Trebor Scholz; Think Outside the Boss; an essay; In Public Seminar; 2015-04-15.
Teaser: Cooperate alternatives to the sharing economy
Trebor Scholz, professor, Hampshire College
Rethinking Marxism, a peer-reviewed journal produced by the Association for Economic and Social Analysis
Rethinking Marxism – A Journal of Economics, Culture & Society; Routledge; since 1988.
Cooperative Alternatives to the Sharing Economy; In Some Blog; 2015-04-29.
Videos? of the panel.
Trackography: You Never Read Alone; Presented at the 31st Chaos Communication Congress (31c3); 2014-12-29; slides (howmany?, twenty?)
tl;dr => the web has beacons. yawn. the author isn’t in the trade.
- EU-focused; not US
- GeoIP (MaxMind)
- Suggested propylaxis
- Privacy Badger
- AdBlock Plus
- Beef Taco
- pale grey is “no coverage”
- dark violet is “some data”
Alec Heller (Akamai); Velocity Conference 2014: UA Strings Are Terrible; Akamai Technologies; At Velocity Conference; 2014-07-29
Alec Heller, Senior Software Engineer at Akamai.
Assert-Media: (width, 400) and (height: 1234)
Accept: image/webp, image/jpg
- In the domain of
- responsive design.
- using the User Agent string to detect screen size.
- The proposal appears at 16:48, and should have been the first and only slide.
- Lots of ums, very low bandwidth presentation, lots of ums.
- tl;dr => they minded large logs with Big Data and found factoids
- Lots of ums, and very painful for the listener.
- Did I mention that there were lots of ums?
- RFC 2616
- RFC 7231
- Apps, each app has a unique string
- Version Numbers
- Serial Numbers & UUIDs
- http-client-hints of Ilya Grigorik
- 2014-06-08 (full day) from some service
- 18,506,131 User Agent Strings “top of list”
- 15,153,962 User Agent Strings were unique