Cryptography

Direct Anonymous Attestation

Direct Anonymous Attestation (DAA) is a cryptographic primitive which enables remote authentication of a trusted computer whilst preserving privacy of the platform's user. The protocol has been adopted by the Trusted Computing Group (TCG) in the latest version of its Trusted Platform Module (TPM) specification to address privacy concerns (see also Loss of Internet anonymity). ISO/IEC 20008 specifies DAA, as well, and Intel's Enhanced Privacy ID (EPID) 2.0 implementation for microprocessors is available for licensing RAND-Z along with an open source SDK. (Wikipedia).

Video thumbnail

Can you identify this substance?

via YouTube Capture

From playlist Random

Video thumbnail

Direct Interrogatives in Italian: Who, What, How, Where, When, Why, and Which

A big part of communicating is asking questions. How do we ask questions? And when? And why? You see what I mean?! We have to learn how this works in Italian, so let's learn the direct interrogatives, like chi, che cosa, come, dove, quando, perchè, and more. Script by Patrizia Farina, Pro

From playlist Italian

Video thumbnail

Introduction to Attribution | Marketing Analytics for Beginners | Part-6

In Google Analytics, attributions are a set of rules that help monitor and attribute which channels, posts, and assets are creating sales opportunities. Attributions help identify specific touchpoints which drive a prospect towards making a purchase. In this video, we talk about some of

From playlist Marketing Analytics for Beginners

Video thumbnail

How to run A/B Tests as a Data Scientist!

Let's learn about how & why you should use Bayesian Testing. And some advantages of the Bayesian approach over frequentist approach with REAL data/code. Note: Bayesian Appraoch isn't necessarily better in every way - it is another perspective of looking at data. CODE: https://github.com/a

From playlist A/B Testing

Video thumbnail

How to Write Acceptance Tests

"How to write Acceptance Tests" describes the use of Automated Acceptance Tests, an important tool in evaluating our software. These tests are focussed on answering questions like "Does our software do what our users want and expect?". Software Development teams have been trying to achieve

From playlist Tutorials

Video thumbnail

Acceptance Testing with Executable Specifications

Acceptance Testing is best practiced through the creation of “Executable Specifications” of the behaviour of the system. This sophisticated automated software testing & software engineering approach allows for the automation of UAT, as well as working as a procedural backbone to driving th

From playlist TDD & ATDD

Video thumbnail

Would Voting Be Better On A Blockchain

Special Note: Our second collectible episode NFT is now up for bids. It’s another no-reserve auction format which will end sometime between March 20th and 21st. Check it out: https://rarible.com/token/0x60f80121c31a0d46b5279700f9df786054aa5ee5:437241:0x86ce5d50015a54c9d7fd044212ed6f243f73

From playlist Podcast: Speaking of Bitcoin

Video thumbnail

Introduction to Indirect Proof

This video introduces indirect proof and proves one basic algebraic and one basic geometric indirect proof. Complete Video List: http://mathispower4u.yolasite.com/

From playlist Relationships with Triangles

Video thumbnail

Indirect Object Pronouns in Italian

We know about direct object pronouns, so what about indirect object pronouns? Wait, what's an indirect object? Let's straighten out some English grammar first, then see how it works in Italian! Script by Patrizia Farina, Professor of Italian at Western Connecticut State University and Pur

From playlist Italian

Video thumbnail

Decentralized Identity - Bonus Livestream Session

Decentralized Identity. it just sounds cool, right? But what is decentralized identity? Can you use it now? How might it be used in the future? Watch this video to learn about all of this and more! Chapters 0:00 Decentralized Identity Livestream Starts 1:04 Thank you Patrons 6:26 Introdu

From playlist Decentralization: DeFi, DID, DEX and more

Video thumbnail

ADISummit: Self-Sovereign Identity Panel

This panel discusses the aspiration of Self-Sovereign Identity within our current systems of identity management - in social networks, hospitals, banks, government databases, or (sadly) the next data dump. Is our identifying information essential to our daily lives, or is it collected bas

From playlist Panel Discussions

Video thumbnail

Stanford Seminar - Intel Software Guard Extensions

"Intel Software Guard Extensions: Innovative Instructions for Next Generation Isolated Execution"- Frank Mckeen of Intel Colloquium on Computer Systems Seminar Series (EE380) presents the current research in design, implementation, analysis, and use of computer systems. Topics range from

From playlist Engineering

Video thumbnail

OWASP AppSecUSA 2012: Doing the Unstuck: How Rugged Cultures Drive Biz & AppSec Value

Speaker: Josh Corman Rugged Software was an attempt to get application security unstuck and beyond the .0001% who were already seeking more defensible infrastructure. Over the past 3 years of experimentation, working outside of the security community, and this spring's Rugged Summit... no

From playlist OWASP AppSecUSA 2012

Video thumbnail

ShmooCon 2013: DIY: Using Trust To Secure Embedded Projects

For more information and to download the video visit: http://bit.ly/shmoocon2013 Playlist ShmooCon 2013: http://bit.ly/Shmoo13 Speakers: Teddy Reed and David Anthony This presentation and paper provides a DIY guide to using Trusted Computing on embedded devices. This is NOT an introducti

From playlist ShmooCon 2013

Video thumbnail

How to access MANSW Conference resources

via YouTube Capture

From playlist Random

Video thumbnail

THIS is the most private and secure phone on the planet - GrapheneOS review and how to install

IMPORTANT UPDATE: The installation guide mentioned in the second half of this video is OUTDATED. Always follow the official the guide for proper up-to-date instructions: https://grapheneos.org/install/ There is only one spot available for the most private and secure phone you can get - and

From playlist TUTORIALS & HOW TO's

Video thumbnail

The Power of Incentives - How Games Help Us Examine Our World - Extra Credits

Games are uniquely suited as a medium to teach us about how our world works. By emulating incentive systems and allowing the player to explore and make their own mistakes, games can change people's minds - in some cases, better than a sermon or lecture on the subject could. As a medium, ga

From playlist Extra Credits (ALL EPISODES)

Video thumbnail

DEFCON 20: Hacking Measured Boot and UEFI

Speakers: DAN GRIFFIN PRESIDENT, JW SECURE, INC. There's been a lot buzz about UEFI Secure Booting, and the ability of hardware and software manufacturers to lock out third-party loaders (and rootkits). Even the NSA has been advocating the adoption of measured boot and hardware-based int

From playlist DEFCON 20

Video thumbnail

DEFCON 20: World War 3.0: Chaos, Control & the Battle for the Net

Panel: OSHUA CORMAN DIRECTOR OF SECURITY INTELLIGENCE, AKAMAI TECHNOLOGIES DAN KAMINSKY JEFF MOSS FOUNDER, DEF CON AND BLACK HAT ROD BECKSTROM MICHAEL JOSEPH GROSS AUTHOR OF THE VANITY FAIR ARTICLE 'A DECLARATION OF CYBER-WAR', MODERATOR There is a battle under way for control of the Int

From playlist DEFCON 20

Video thumbnail

Indirect Hypnosis How To

Here I explain the steps that go into Indirect Hypnosis. Capture attention, Establish a Trance, The Yes Set, Power of Analogies, How Milton Erickson did it and much more.

From playlist Psychology Tutorials

Related pages

Digital credential | Cryptographic primitive | Trusted Platform Module | Enhanced privacy ID | Zero-knowledge proof | Public-key cryptography | Content Scramble System