{"id":623,"date":"2015-06-12T12:59:12","date_gmt":"2015-06-12T11:59:12","guid":{"rendered":"http:\/\/test.radical-openness.org\/2015\/?p=623"},"modified":"2021-05-14T18:29:28","modified_gmt":"2021-05-14T17:29:28","slug":"privacy-and-viruses","status":"publish","type":"post","link":"https:\/\/research.radical-openness.org\/2015\/privacy-and-viruses\/","title":{"rendered":"Privacy and Viruses"},"content":{"rendered":"<p>At the ArtLab we had some discussions around privacy, surveillance and how our data is spread online, so the two first videos are points of views on these topics. One of the projects was looking more closely into what viruses are on the hard-drives. Therefore Mikko Hypp\u00f6nens talk might be interesting giving a nutshell introduction into history of computer viruses.<br \/>\n<br \/>\nThe NSA are not the Stasi: Godwin for mass surveillance by \u00a0Cory Doctorow (Electronic Frontier Foundation)<br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/l8Q0Mme33bM\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\n<br \/>\nBeyond The Camera Panopticon by Aral Balkan (Founder and lead designer Ind.ie)<br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/jh8supIUj6c\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\n<br \/>\n&#8220;The Cyber Arms Race&#8221; &#8211; Mikko Hypp\u00f6nen, F-Secure &#8211; Guest Lecture 20.1.2015 at Aalto University<br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/tUotmeaZayE\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the ArtLab we had some discussions around privacy, surveillance and how our data is spread online, so the two first videos are points of views on these topics. One of the projects was looking more closely into what viruses are on the hard-drives. Therefore Mikko Hypp\u00f6nens talk might be interesting giving a nutshell introduction [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[3],"tags":[16,36,34,41,14,38],"class_list":["post-623","post","type-post","status-publish","format-standard","hentry","category-behind-the-smart-world","tag-activists","tag-data-leak","tag-privacy","tag-talks","tag-video","tag-virus"],"_links":{"self":[{"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/posts\/623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/comments?post=623"}],"version-history":[{"count":2,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/posts\/623\/revisions"}],"predecessor-version":[{"id":625,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/posts\/623\/revisions\/625"}],"wp:attachment":[{"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/media?parent=623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/categories?post=623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/tags?post=623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}