Baba Jason
Baba Jason

Baba Jason

      |      

Subscribers

   Latest videos

Baba Jason
22 Views · 8 months ago

Thanks for checking out this introduction video on building a gaming pc. All links mentioned in the video are below.

ttps://www.youtube.com/watch?v=mCq8-xTH7jA&t=102s

https://pcpartpicker.com/list/

https://www.microcenter.com/si....te/content/custom-pc

https://www.newegg.com/tools/c....ustom-pc-builder/?cm

Baba Jason
11 Views · 8 months ago

A short clip from a special workshops hosted by Jason Thigpen from Just Right Technology titled CS 2.0

Baba Jason
8 Views · 8 months ago

Hacker and public interest technologist Matt Mitchell talks about the current state of the internet and how we all have a role in it's safety and security. He refers to the "Golden Hour," the window of time that might determine the future of the internet. He argues that a special role is needed of the folks working at tech firms who build the internet, and why Googlers are in a unique place to be especially vital.

Baba Jason
20 Views · 8 months ago

In episode 21 of under CTRL, we interviewed celebrated human rights defender, hacker and security trainer Matt Mitchell and discussed different forms of social injustice and privacy intrusion that are increasingly apparent in cyberspace.
Considered one of the most influential minds in the cybersecurity community, Matt felt compelled to use his knowledge for good. As a tech fellow of the Ford Foundation and co-founder of CryptoHarlem, Matt helps high-risk individuals, marginalized groups, and journalists secure their identity and work online.
Listen on for real-life examples, tips and stories of a quest to safeguard privacy of those who need it most.

#cybersecurity #encryption #privacy #ngo #cryptoharlem #fordfoundation

Baba Jason
11 Views · 8 months ago

“This can protect you from losing everything."

CryptoHarlem founder and Mozilla Fellow Matt Mitchell (https://twitter.com/geminiimatt) shares six steps for keeping activists and NGOs safe online.

MozFest is the world's leading festival for the open internet movement. Our speakers address topics like privacy, online harassment, and digital inclusion.

https://mozillafestival.org | https://twitter.com/mozillafestival

Baba Jason
12 Views · 8 months ago

Technology at work for the public: http://bit.ly/2pPb0Ee

“It’s not a matter of if you will be hacked as an organization, it’s a matter of when.”
____

Matt Mitchell, a hacker working at the intersection of social justice and technology, says organizations must be proactive in protecting themselves from hackers. That means having “an understanding of the digital threats and planning before problems occur,” he says.

Technology is transforming every area of our lives. But as it opens new avenues and shows us fresh possibilities, tech can also deepen existing inequalities. We believe in harnessing technology to serve justice and the public interest—and we see a wealth of opportunities to do so.

That’s why the Ford Foundation is working with a community of partners to develop a path for people to use their technology skills to change the world for the better: the professional field of public interest technology. Public interest technology is just what it sounds like—technology used to serve the public good. That can mean working to ensure that as the U.S. census goes online for the first time, it is accessible and accurate. It can mean researching the negative side effects of using artificial intelligence in our criminal justice system or even developing technical standards that emphasize privacy and free expression.

More at FordFoundation.org/tech
http://bit.ly/2pPb0Ee

____

We want this video to be accessible to the widest possible audience.

For a fully accessible version with audio descriptions and a transcript, please visit:
https://www.fordfoundation.org..../news-and-stories/vi

This video series is also available with audio descriptions on YouTube, please click on the following link to access the playlist: https://youtube.com/playlist?l....ist=PLOoIZTxzMxeBaJk

To learn more about inclusive media, please visit https://rootedinrights.org/accessthat/

_______


Subscribe! https://www.youtube.com/subscr....iption_center?add_us

Follow Ford Foundation on social media!
Facebook: https://www.facebook.com/FordFound Twitter: https://twitter.com/FordFoundation
Instagram: https://www.instagram.com/fordfoundation/
LinkedIn: https://www.linkedin.com/company/ford-foundation

Baba Jason
13 Views · 8 months ago

Matt Mitchell is a hacker,and the Director of Digital Safety & Privacy, at Tactical Tech (also known as the Tactical Technology Collective). In his work there Matt leads security training efforts, curricula, and organizational security for the organization in their mission to raise awareness about privacy, provide tools for digital security, and mobilize people to turn information into action.

Matt is a well known security researcher, operational security trainer, and data journalist who founded & leads CryptoHarlem, impromptu workshops teaching basic cryptography tools to the predominately African American community in upper Manhattan.

Baba Jason
17 Views · 8 months ago

NOTHING TO HIDE (2017) deals with the acceptance of mass surveillance through the "I have nothing to hide" narrative. “Eye-opening” (Forbes) “Fascinating” (Les Inrocks).
Support the Creative Commons Non Derivative Non Commercial licence of the film: leetchi.com/c/project-nothing-to-hide allowing the film to be online for free.

More info about Nothing to Hide and its sequel Disappear: https://deepdocs.eu

The production of the film a cost, we rely on your donations.
*About the Creative Commons license:
The license Creative Commons – Attribution – Non Commercial – No Derivatives (CC-BY-NC-ND) allows you:
- to watch and share the film for free in four languages (English, French, German, Spanish) if you give credit to the authors and share the link of the website (https://deepdocs.eu).
- to organize a public screening without paying any royalties as long as the entrance to the screening is free and open to everyone.
- For commercial screenings (with entrance fee, yearly fee or restricted to certain audiences, i.e. conferences) and for broadcasting, contact the authors on the website (https://deepdocs.eu).
- You are invited to make a donation to contribute paying the production of the film and its upcoming follow-up.

Baba Jason
17 Views · 8 months ago

Find out more at: http://14.re-publica.de/sessio....n/fear-and-loathing-

Ths talk will contextualize recent surveillance revelations with the rise of the commercial market for offensive digital capability.

Morgan Marquis-Boire
https://citizenlab.org/

Creative Commons Attribution-ShareAlike 3.0 Germany
(CC BY-SA 3.0 DE)

Baba Jason
11 Views · 8 months ago

The feeling of security and the reality of security don't always match, says computer-security expert Bruce Schneier. At TEDxPSU, he explains why we spend billions addressing news story risks, like the "security theater" now playing at your local airport, while neglecting more probable risks -- and how we can break this pattern.

Baba Jason
8 Views · 8 months ago

Bruce Schneier, American cryptographer, computer security and privacy specialist, will be coming to Google to talk about his new book:

"Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World"

"You are under surveillance right now.

"Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

"The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.

"Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again." (W.W. Norton & Co., Inc)

Baba Jason
5 Views · 8 months ago

One night in 1971, files were stolen from an F.B.I. office near Philadelphia. They proved that the bureau was spying on thousands of Americans.

Baba Jason
7 Views · 8 months ago

With recent high-profile and widespread computer viruses making headlines, it’s become obvious that the future is now. In this instalment we count down 10 crucial facts you should know about cyber security. The term “cyber security” was coined in 1988 as a result of one of the first ever registered online viruses, the “Morris worm.”We have T-Shirts! Be sure to check out http://www.WatchMojo.com/store for more info. WatchMojo is a leading producer of reference online video content, covering the People, Places and Trends you care about.We update DAILY with 2-3 Top 10 lists, Origins, Biographies, Versus clips on movies, video games, music, pop culture and more!

Baba Jason
11 Views · 8 months ago

The biggest risk to you and your company's privacy is your smartphone. Some of the most popular apps on your smartphone ask for permissions that expose data to outside sources. We asked people on the street to read some of these permissions out loud so we could capture their reactions.Take control of your privacy. #privacyproject

Baba Jason
9 Views · 8 months ago

The untold story of Jelani Henry, who says Facebook likes landed him in Rikers.

Read more on The Verge: http://www.theverge.com/2014/1....2/10/7341077/nypd-ha

Subscribe to The Verge: http://www.youtube.com/subscri....ption_center?add_use

Check out our full video catalog: http://www.youtube.com/theverge/videos
Visit our playlists: http://www.youtube.com/theverge/playlists
Like The Verge on Facebook: http://www.facebook.com/verge
Follow on Twitter: http://www.twitter.com/verge
Follow on Instagram: http://www.instagram.com/verge
Read More: http://www.theverge.com

Baba Jason
3 Views · 8 months ago

An introduction to the Afrikan Centered Class titled Introduction to Basic HTML for Afrikans.

Baba Jason
7 Views · 8 months ago

A great example of the type of programming that can happen in your community to promote S.T.E.M. education.

Baba Jason
27 Views · 2 years ago

This video demostrates using the path tool as well as sharing some free resouces for graphics design.

Baba Jason
62 Views · 2 years ago

In this video, Baba Jason walks parents through uploading artwork and the basic tools you can use to create your own sprite.

Show more