text
stringlengths 0
353
| EmoClass
stringclasses 10
values | EmoAct
float64 1
7
| EmoVal
float64 1
7
| EmoDom
float64 1
7
| SpkrID
stringlengths 1
7
| Gender
stringclasses 3
values |
|---|---|---|---|---|---|---|
no, i didn't actually see all of it, but i did see part of it. and just coming around the internet, again, harvey keitel.
|
X
| 4.2
| 4.6
| 4
|
514
|
Male
|
more literal, the confrontational dialogue is very like, "oh, men think this."
|
C
| 4.6
| 3.6
| 4.4
|
512
|
Male
|
can everyone be quiet? jim can say, there's some cunnilingus again in the method boys. and that way we can put it in the director's club soundboard. all right.
|
X
| 4.4
| 4.6
| 4.2
|
513
|
Male
|
i don't necessarily always see as being a problem when i watch her movies.
|
N
| 4
| 3.8
| 4.4
|
512
|
Male
|
that's so constrained by having to tell abc beginning, middle, end narrative in just one thing or who knows? it could just be all.
|
N
| 4
| 4.2
| 4.3
|
514
|
Male
|
yeah. sometimes it gets to be a mad man [inaudible]
|
D
| 4.4
| 3.4
| 4.6
|
513
|
Male
|
that's the transaction. they have to miss something that they really wanted to see in order to listen to this.
|
N
| 4.6
| 4.4
| 4.8
|
514
|
Male
|
well, i don't recommend portrait of a lady, patrick, it's really slow and kind of impenetrable in my opinion, anyway.
|
C
| 4.6
| 2.6
| 4.8
|
512
|
Male
|
[inaudible] version of the piano stretched for two and a half hours without really those
|
N
| 3.8
| 3.8
| 3.4
|
512
|
Male
|
things. fuck it, let's burn the whole episode to the ground.
|
H
| 6
| 4
| 5.4
|
513
|
Male
|
wow. isn't it interesting? after prometheus came out.
|
H
| 4.8
| 4.8
| 4.4
|
513
|
Male
|
i believe the name wasn't taken. jim is at twitter.
|
H
| 6.058824
| 6.176471
| 5.764706
|
513
|
Male
|
i would like to thank each and every one of you for tuning into this week's episode when you could be doing anything else with your valuable time right now.
|
X
| 4.6
| 5
| 4
|
16
|
Male
|
i have a few announcements to make before we get on to the substance of the podcast,
|
N
| 2.8
| 4
| 3.4
|
16
|
Male
|
guest interview suggestions and general feedback about the show. as i mentioned last week, soundcloud uploads are here.
|
N
| 4.6
| 4.6
| 4.6
|
16
|
Male
|
i've also begun posting episodes of the podcast on youtube.
|
N
| 4
| 4.2
| 4
|
16
|
Male
|
techcrunch reporter, kim-mai cutler, wrote about the impact the law would have the day it was passed.
|
N
| 4.4
| 4
| 4.2
|
16
|
Male
|
another example of people using technology to escape government oppression comes to us from hong kong, where people have been using a unique...
|
N
| 3.8
| 4.2
| 4.4
|
16
|
Male
|
i can see how this feature would be useful. and i've also seen requests for additional features that could be helpful in these kinds of protest environments, including
|
N
| 4
| 4.882353
| 4.411765
|
16
|
Male
|
an end-to-end encryption so people can chat privately without their messages being collected by people monitoring the networks.
|
X
| 4.4
| 4.6
| 4.6
|
16
|
Male
|
i've met many of them myself. they're very nice and intelligent people.
|
H
| 4.166667
| 4.666667
| 4.5
|
16
|
Male
|
on the other side of the spectrum, open source p2p file synchronization program sync thing has been rebranded as pulse
|
H
| 5.333333
| 4.916667
| 5.166667
|
16
|
Male
|
ind.ie, spelled i-n-d.i-e.
|
N
| 4.4
| 4.4
| 4.6
|
16
|
Male
|
"blockchain, decentralized transactions and autonomous agents, decentralized decision making."
|
N
| 5.2
| 4.6
| 5.2
|
16
|
Male
|
and the line between technology and humanity becomes so blurred as to become indistinguishable.
|
N
| 2.8
| 3.4
| 4.4
|
16
|
Male
|
will this technological revolution be liberating or enslaving?
|
X
| 5
| 3.8
| 5.6
|
16
|
Male
|
if decentralized computing wins over the market, we might have a chance at a future free from centralized control.
|
H
| 4.4
| 4.8
| 5
|
Unknown
|
Unknown
|
and which way one goes will depend on a lot of factors, including cultural, societal, governmental, and technological.
|
N
| 4.6
| 4.2
| 4.8
|
16
|
Male
|
architectural problems within. many different new types of networks were invented,
|
N
| 3.2
| 4.4
| 3.2
|
17
|
Male
|
and encrypting email is still a somewhat unsolved problem, but i decided to tackle one side of that problem by encrypting it on the end user device.
|
N
| 3.8
| 5
| 4.2
|
17
|
Male
|
you could tell espionage to encrypt mail, and then when the user launched mail, it would ask them for their password.
|
N
| 3.6
| 4.4
| 4
|
17
|
Male
|
they're the closest that we've gotten so far that's even remotely usable as gpg,
|
N
| 3.2
| 3.8
| 4.2
|
17
|
Male
|
but that's still the usability nightmare, and that's sort of the next step for me is to work on making that usable while simultaneously being a end-to-end encrypting.
|
O
| 3.4
| 3
| 3.8
|
17
|
Male
|
back in college, when i decided to start encrypting people's email on their computers on one end point,
|
N
| 4.5
| 4.666667
| 4.666667
|
17
|
Male
|
do encrypted email end-to-end and encrypted communications in general end-to-end,
|
N
| 4
| 4.6
| 4.6
|
17
|
Male
|
and end-to-end encrypted messaging. and the biggest problem that is facing that world is authentication.
|
N
| 3.666667
| 3.333333
| 4.25
|
17
|
Male
|
in order for somebody to send you an email, they have to get your public key, and that's a usability nightmare.
|
N
| 3.6
| 3.4
| 4.2
|
17
|
Male
|
the public key for any individual could become compromised, in which case that person no longer has your accurate public team.
|
N
| 3
| 3.4
| 4
|
Unknown
|
Unknown
|
the problem is how do i get somebody's public key in order to send them an encrypted email? how do i know that that,
|
N
| 3.4
| 3
| 4.6
|
17
|
Male
|
where he said that the blockchain squares zooko's triangle? and what essentially makes it possible is for me to meet you in person or over the internet
|
N
| 2.2
| 4
| 2.8
|
17
|
Male
|
and end-to-end encrypted message via email or anything else. the blockchain makes that possible.
|
N
| 2.8
| 4.4
| 4.2
|
17
|
Male
|
this is how people are already used to. i'm conditioned to sending email. so, in order to make end-to-end encrypted email usable,
|
N
| 3
| 4.6
| 4.4
|
17
|
Male
|
to facilitate all kinds of different types of distributed and decentralized businesses and services...
|
N
| 2.4
| 3.8
| 2.8
|
17
|
Male
|
that is how identity works online today. it's mostly twitter. if you search somebody's name on a search engine, and if they have a twitter account that will oftentimes be the number one result.
|
N
| 3.4
| 4.2
| 4.4
|
17
|
Male
|
and for that reason, they have become almost synonymous with identity today, whereas before it used to be your website.
|
N
| 3.6
| 3.8
| 3.4
|
17
|
Male
|
so, these days twitter seems to be almost synonymous with identity. and then, to a lesser extent, your personal website.
|
N
| 2.2
| 4.4
| 3.4
|
17
|
Male
|
decide that they don't like somebody shut down their account and they've done this. similarly, nobody owns their website today. people think that they own their website,
|
A
| 3.2
| 2.7
| 4
|
17
|
Male
|
but they actually rent it from an organization called icann. and while fairly rare, it does happen when many different websites,
|
N
| 4.4
| 3.8
| 4.4
|
17
|
Male
|
et cetera. people these days tend to rent their online identities. they don't own them.
|
N
| 3.6
| 4.4
| 4.6
|
17
|
Male
|
nobody can take it away from you. the only way that that would be possible was if all of a sudden the developers completely changed the nature of namecoin.
|
N
| 3.6
| 4.8
| 4.8
|
17
|
Male
|
the blockchain is a wonderful tool for getting rid of middlemen. so, where does dns chain fit into all this?
|
N
| 4.4
| 5
| 4.6
|
17
|
Male
|
the problem with namecoin is that it's very difficult to get set up and running with namecoin.
|
N
| 3.4
| 3.8
| 4.2
|
17
|
Male
|
if you want to be able to take advantage of all of these fantastic features that it provides, you can download it and then you can have it running on your laptop,
|
N
| 4.333333
| 4.888889
| 4.222222
|
17
|
Male
|
except i just use it remotely via the server that it's running on. i talked to dns chain over a man in the middle of proof connection,
|
N
| 4.1
| 4.3
| 4.2
|
17
|
Male
|
and then all of the information in the namecoin blockchain is then... it becomes accessible to me, including all of those public keys. and those public keys can be used for gpg. they can be used...
|
N
| 3.142857
| 4.142857
| 3.857143
|
17
|
Male
|
and i use that term to refer to systems that provide individuals security from today's threats.
|
N
| 3.2
| 4.4
| 4
|
17
|
Male
|
from the sort of global mass surveillance threats that people face today in reality and any system that cannot protect users,
|
F
| 3.4
| 3
| 4.4
|
17
|
Male
|
that's the case. so imessage, for example, would be a protocol that does not provide meaningful security because apple holds those keys.
|
N
| 4
| 3.2
| 3.4
|
17
|
Male
|
and then you use that to create new keys as you're talking to them to encrypt messages, and these keys are forgotten, they're not stored anywhere. they're called ephemeral keys because of that.
|
N
| 4.2
| 4.8
| 4
|
17
|
Male
|
not even the people who are communicating, after the fact, can access that data and decrypt it.
|
N
| 4.2
| 3.8
| 3.8
|
17
|
Male
|
how does dnschain and okturtles meet this meaningful security criteria?
|
N
| 4
| 4.2
| 4.6
|
16
|
Male
|
the missing puzzle piece that it fills. dnschain allows people to easily obtain the accurate, up-to-date public keys for any entity.
|
N
| 4.4
| 4.6
| 4.4
|
17
|
Male
|
and tell the user that the connection to this website is secure, even though it's not. a fraudulent key was issued.
|
N
| 3
| 2.6
| 3.4
|
17
|
Male
|
but unlike today's system, users actually have reason to trust the dnschain server. they have legitimate reasons to trust them
|
X
| 3.8
| 5
| 4.6
|
17
|
Male
|
because either they own and operate that dnschain server themselves, or it's one of their close, trustworthy friends who is operating the server.
|
N
| 3.545455
| 4
| 3.909091
|
17
|
Male
|
and if that were the case, then the people living in that home don't need to ask their internet service provider. they don't need to trust anyone that they don't trust.
|
C
| 3.714286
| 3.285714
| 4.285714
|
17
|
Male
|
and they would be able to securely send email and various other forms of secure communication to their friends
|
X
| 4.2
| 4.8
| 4.4
|
17
|
Male
|
without having to rely on untrustworthy third parties that could potentially man-in-the-middle the connection.
|
N
| 1.8
| 3.6
| 3.2
|
17
|
Male
|
one is the ip address of the server, and since it's a dns server, they kind of already need to know that. for example, many people know google's very memorable dns server ip's,
|
N
| 4.4
| 4.6
| 4.2
|
17
|
Male
|
and can change the dns server's ip there, and in the case of a dns chain server running on a router.
|
N
| 3.833333
| 3.833333
| 4.5
|
17
|
Male
|
and then the second piece of information that's needed is the dnschain server's public key fingerprint.
|
N
| 3.8
| 4
| 4
|
17
|
Male
|
but the point is, is that yes, at some point you're going to have to trust somebody. if you don't trust anybody at all, you're basically out of luck.
|
N
| 3.866667
| 3
| 4.866667
|
17
|
Male
|
so the point of dnschain is to severely limit by orders of magnitude, the number of entities that need to be trusted, from thousands to one,
|
N
| 3.8
| 4.4
| 4.4
|
17
|
Male
|
their internet service provider or that they would trust the nsa who can manipulate their internet service provider.
|
N
| 3.8
| 3.4
| 3.8
|
17
|
Male
|
that's an interesting security model and an interesting trust model
|
N
| 3.3
| 4.2
| 4.1
|
16
|
Male
|
against a blockchain. so with that said-
|
N
| 3.8
| 4
| 4
|
16
|
Male
|
before i forget, i'd like to make a comment on the terminology. the little keyword, trustless, that you brought up.
|
N
| 3.222222
| 3.444444
| 4.111111
|
17
|
Male
|
to be able to use namecoin in a trustless way, you have to run a namecoin node on the machine that you are using.
|
X
| 4
| 4
| 4.8
|
17
|
Male
|
one of the most promising ones is called ultimate blockchain compression for unspent transaction outputs.
|
H
| 3
| 4.666667
| 3.666667
|
17
|
Male
|
so even if say, at some point in the future, somebody manages to get a system that uses that technology up and running. i suspect that dnschain will still be a preferable model
|
N
| 3.6
| 4.6
| 4.2
|
17
|
Male
|
and double-spend and things like that, but it's still extremely secure, even in the face of a 51% attack.
|
N
| 4
| 4.6
| 4.4
|
17
|
Male
|
so if super-alien attackers coming at our blockchain and us having to do crypto kung fu to protect our blockchain and private keys from attackers.
|
N
| 3.4
| 4
| 3.6
|
16
|
Male
|
we've established that a 51% attack, at most, could maybe sensor new entries into the blockchain,
|
N
| 4.2
| 3.8
| 4.2
|
16
|
Male
|
with very little ability to actually mess with the integrity of that data that's actually already in the blockchain.
|
N
| 3.8
| 4
| 3.8
|
16
|
Male
|
one other threat that's a little bit different than 51% attacks would be quantum computing. i assume that,
|
N
| 3.294118
| 4.058824
| 3.941176
|
16
|
Male
|
but- that is hearsay at this point in time that i cannot vouch for. i would say that, if that proves to be true.
|
N
| 3.8
| 3.4
| 4.2
|
17
|
Male
|
okay. that's good to know. so, if anybody out there is concerned about this stuff start investing in quantum cryptography.
|
N
| 3.8
| 4.6
| 4
|
16
|
Male
|
there are two projects that are involved in this: there's dnschain and then there's okturtles.
|
N
| 3.4
| 4
| 4.2
|
17
|
Male
|
both of which are under the umbrella of a nonprofit called the okturtles foundation. currently, most of the development has been focused on dnschain and the audience for that is very different.
|
N
| 3.8
| 4.2
| 4.4
|
17
|
Male
|
the point of dnschain is to make it very, very simple for applications and users to access the information in these blockchains.
|
N
| 2.333333
| 3.833333
| 3.666667
|
17
|
Male
|
they could, but those registration details are going to be unblinded to the person you trade with. so if you don't give your... that's why it's your payment details,
|
N
| 4.2
| 4
| 4.4
|
437
|
Male
|
but you can get a flavor for it. i do encourage people to just download it or you can go and get help if you want to build it yourself. look through the code,
|
H
| 5.416667
| 5.5
| 5.083333
|
437
|
Male
|
putting this on a cell phone would be great, getting a mobile app. i mean, that's more like a longterm aspect for us.
|
X
| 3.4
| 5
| 3.4
|
437
|
Male
|
i mean the luminic hand with the taser and it's like the most awesome thing you'd ever see.
|
H
| 4.8
| 6.4
| 5
|
542
|
Male
|
then the guy on the screen falls down and then he looks at our participants and said, anybody want to give it a shot?
|
U
| 4.8
| 4.6
| 4.8
|
542
|
Male
|
how do we do that? fabulous. our engineering department actually made a movie that was real high quality.
|
N
| 2.8
| 5
| 4.2
|
542
|
Male
|
brought it there. nice. yeah. our underground utilities guys. they had a cutaway section of a fire hydrant and it was just cool stuff like that, where we got all this stuff.
|
H
| 4
| 5.2
| 4
|
542
|
Male
|
we did it. whatever we set out to accomplish didn't include cookies,
|
H
| 5
| 4.888889
| 5
|
542
|
Male
|
but because the cookies are here, we knew we made a dif-
|
H
| 5.642857
| 6.142857
| 5.5
|
542
|
Male
|
well, it's no cost. that was one of the biggest challenges had at the beginning. we just put out a lot of press releases. we use social media a lot to let people know what happened.
|
N
| 2.8
| 3.8
| 4
|
542
|
Male
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.