Channel Avatar

USENIX Enigma Conference @UCIdV7bE97mSPTH1mOi_yUrw@youtube.com

7.5K subscribers - no pronouns :c

The Enigma Conference centers on a single track of engaging


20:12
USENIX Enigma 2023 - How the Internet Improves Humanity
19:05
USENIX Enigma 2023 - Invited Talk: Metric Perversity and Bad Decision-Making
21:27
USENIX Enigma 2023 - When Malware Changed Its Mind: How "Split Personalities" Affect Malware...
20:52
USENIX Enigma 2023 - Adventures in Authentication and Authorization
20:24
USENIX Enigma 2023 - Protecting Whistleblower Information
24:50
USENIX Enigma 2023 - Myths and Lies in InfoSec
20:11
USENIX Enigma 2023 - How Geopolitical Change Causes People to Become (More) Vulnerable
21:09
USENIX Enigma 2023 - The Very Hungry Defender: Metamorphosing Security Decision-Making...
24:38
USENIX Enigma 2023 - Open Source Software and Journalism: Field Notes from a Global Perspective
23:22
USENIX Enigma 2023 - Working on the Frontlines: Privacy and Security with Vulnerable Populations
22:25
USENIX Enigma 2023 - The Dirty Laundry of the Web PKI
17:06
USENIX Enigma 2023 - Building an Automated Machine for Discovering Privacy Violations at Scale
29:13
USENIX Enigma 2023 - The Edge of Developed Practice in Searching Encrypted Data
37:27
USENIX Enigma 2023 - Fireside Chat with Simson Garfinkel on Quantum Technologies
18:25
USENIX Enigma 2023 - A New Process to Tackle Misinformation on Social Media
44:33
USENIX Enigma 2023 - Fireside Chat: The State of Memory Safety
35:46
USENIX Enigma 2023 - Panel: True Crime Journalism: Cyber
51:34
USENIX Enigma 2023 - Panel: The Emperor's New Clothes: Location Data & the Promise of Anonymization
22:35
USENIX Enigma 2023 - Meaningful Hardware Privacy for a Smart and Augmented Future
18:18
USENIX Enigma 2023 - Technical Metamorphosis: The 3 Stages of DSAR Automation
17:24
USENIX Enigma 2023 - Spotting the Differences: Quirks of Machine Learning (in) Security
20:01
USENIX Enigma 2023 - What Public Interest AI Auditors Can Learn from Security Testing...
11:23
USENIX Enigma 2023 - The Not Fake News Hour
20:17
USENIX Enigma 2023 - Navigating the Sandbox Buffet
16:04
USENIX Enigma 2023 - Understanding Trust & Security Processes in the Open Source Software Ecosystem
18:59
USENIX Enigma 2023 - Technology Abuse Clinics for Survivors of Intimate Partner Violence
22:56
USENIX Enigma 2023 - So You're Going to Blow the Whistle? Communications Dos and Don'ts...
20:21
USENIX Enigma 2023 - Characterizing and Measuring Misleading and Harmful Online Ad Content at Scale
16:11
USENIX Enigma 2023 - The Slippery Slope of Cybersecurity Analogies
44:43
USENIX Enigma 2023 - Panel: Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else?
17:12
USENIX Enigma 2023 - Why Is Our Security Research Failing? Five Practices to Change!
01:32:11
USENIX Enigma 2022 - Panel: Understanding Section 230
55:30
USENIX Enigma 2022 - Panel: Sex Work, Tech, and Surveillance
20:04
USENIX Enigma 2022 - #Protect2020: An After Action Report
18:34
USENIX Enigma 2022 - Neither Band-Aids nor Silver Bullets: How Bug Bounties Can Help the Discovery
17:45
USENIX Enigma 2022 - Auditing Data Privacy for Machine Learning
20:16
USENIX Enigma 2022 - Content-Oblivious Trust and Safety Techniques: Results from a Survey of Online
33:43
USENIX Enigma 2022 - Fireside Chat with Sheera Frenkel
16:49
USENIX Enigma 2022 - Healthcare Ecosystem: Security's Role in Helping HealthTech Find Its Way
22:56
USENIX Enigma 2022 - The Global Privacy Control: Exercising Legal Rights at Scale
15:05
USENIX Enigma 2022 - Detection Is Not Enough: Attack Recovery for Safe and Robust Autonomous Robotic
23:57
USENIX Enigma 2022 - An Open-Source Taxonomy for Ex-ante Privacy
22:28
USENIX Enigma 2022 - Broken CAPTCHAs and Fractured Equity: Privacy and Security in hCaptcha
17:15
USENIX Enigma 2022 - Teaching an Old Dog New Tricks: Reusing Security Solutions in Novel Domains
19:17
USENIX Enigma 2022 - Rethinking "Security" in an Era of Online Hate and Harassment
23:27
USENIX Enigma 2022 - When Machine Learning Isn’t Private
23:12
USENIX Enigma 2022 - Crypto for the People (part 2)
18:04
USENIX Enigma 2022 - Thinking Slow: Exposing Influence as a Hallmark of Cyber Social Engineering
18:48
USENIX Enigma 2022 - Leveraging Human Factors to Stop Dangerous IoT
17:21
USENIX Enigma 2022 - Covenants without the Sword: Market Incentives for Security Investment
21:01
USENIX Enigma 2022 - Can the Fight against Disinformation Really Scale?
19:16
USENIX Enigma 2022 - Why Has Your Toaster Been through More Security Testing than the AI System
20:33
USENIX Enigma 2022 - Around the World in 500 Days of Pandemic Misinformation
21:08
USENIX Enigma 2022 - The Security Team at the Top: The Board of Directors
18:38
USENIX Enigma 2022 - I See You Blockchain User, or Not! Privacy in the Age of Blockchains
21:39
USENIX Enigma 2022 - You Can’t Always Get What You Want / But You Get What You Need: Moderating E2EE
23:27
USENIX Enigma 2022 - Contextual Security: A Critical Shift in Performing Threat Intelligence
18:03
USENIX Enigma 2022 - Burnout and PCSD: Placing Team At Risk
01:58:16
USENIX Enigma 2021 - Contact Tracing Panel
19:36
USENIX Enigma 2021 - The Full Stack Problem of Election Security