Internet Expert Debunks Cybersecurity Myths | WIRED
Video Statistics and Information
Channel: WIRED
Views: 287,310
Rating: 4.8991327 out of 5
Keywords: cybersecurity, cybersecurity expert, computer hacker, hackers, hacker security, encryption, google read gmail, hackers computer camera, computer camera hacker, hacker camera, wired hacker, hacking expert, cyber security, computer security, network security, network security hacker, wired network security, computer hackers, hackers computer, security wired, wired eva galperin, eva galperin, eva galperin cybersecurity, mythbusting wired, mythbusting, wired
Id: cQI0O7xdNOU
Channel Id: undefined
Length: 11min 25sec (685 seconds)
Published: Wed Jul 29 2020
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.
From Wikepidia : Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation and technical advisor for the Freedom of the Press Foundation. She is noted for her extensive work in protecting global privacy and free speech and for her research on malware and nation-state spyware.
Sounds like she knows what she's talking about
I don't have sticker on my webcam, I keep it simple - it just doesn't work under debian by default and I have no reason to get it fixed Β―\_(γ)_/Β―
I appreciate the info, but most of the stuff is common knowledge if you're in IT. Probably more helpful for non-IT folk
I was thinking to share this out tomorrow for end user education, but I might give people headaches with the nonstop camera cuts and zooms. Really expected higher quality from Wired.
The hotels Iβve been staying at in the US. All of them had open WiFi. No acknowledging or agreeing usage. No password. I feel like they either donβt care or I didnβt understand it.
Pretty accurate up until she states the the IT manager cant see in to your https website your accessing, actually, yes, yes i can........
This section is pretty inaccurate.
Typically for me to stop you uploading the business secrets or downloading the virus.exe i need to dig inside the https stream of data, in a business i can do this by having the firewall trust the end point and also the website, however the firewall will be inspecting both parts before it sends them on, man in the middle.
Didn't know that stuff about Tor
I met her at a convention. Nice lady if a bit timid.