text
stringlengths
0
353
EmoClass
stringclasses
10 values
EmoAct
float64
1
7
EmoVal
float64
1
7
EmoDom
float64
1
7
SpkrID
stringlengths
1
7
Gender
stringclasses
3 values
no, i didn't actually see all of it, but i did see part of it. and just coming around the internet, again, harvey keitel.
X
4.2
4.6
4
514
Male
more literal, the confrontational dialogue is very like, "oh, men think this."
C
4.6
3.6
4.4
512
Male
can everyone be quiet? jim can say, there's some cunnilingus again in the method boys. and that way we can put it in the director's club soundboard. all right.
X
4.4
4.6
4.2
513
Male
i don't necessarily always see as being a problem when i watch her movies.
N
4
3.8
4.4
512
Male
that's so constrained by having to tell abc beginning, middle, end narrative in just one thing or who knows? it could just be all.
N
4
4.2
4.3
514
Male
yeah. sometimes it gets to be a mad man [inaudible]
D
4.4
3.4
4.6
513
Male
that's the transaction. they have to miss something that they really wanted to see in order to listen to this.
N
4.6
4.4
4.8
514
Male
well, i don't recommend portrait of a lady, patrick, it's really slow and kind of impenetrable in my opinion, anyway.
C
4.6
2.6
4.8
512
Male
[inaudible] version of the piano stretched for two and a half hours without really those
N
3.8
3.8
3.4
512
Male
things. fuck it, let's burn the whole episode to the ground.
H
6
4
5.4
513
Male
wow. isn't it interesting? after prometheus came out.
H
4.8
4.8
4.4
513
Male
i believe the name wasn't taken. jim is at twitter.
H
6.058824
6.176471
5.764706
513
Male
i would like to thank each and every one of you for tuning into this week's episode when you could be doing anything else with your valuable time right now.
X
4.6
5
4
16
Male
i have a few announcements to make before we get on to the substance of the podcast,
N
2.8
4
3.4
16
Male
guest interview suggestions and general feedback about the show. as i mentioned last week, soundcloud uploads are here.
N
4.6
4.6
4.6
16
Male
i've also begun posting episodes of the podcast on youtube.
N
4
4.2
4
16
Male
techcrunch reporter, kim-mai cutler, wrote about the impact the law would have the day it was passed.
N
4.4
4
4.2
16
Male
another example of people using technology to escape government oppression comes to us from hong kong, where people have been using a unique...
N
3.8
4.2
4.4
16
Male
i can see how this feature would be useful. and i've also seen requests for additional features that could be helpful in these kinds of protest environments, including
N
4
4.882353
4.411765
16
Male
an end-to-end encryption so people can chat privately without their messages being collected by people monitoring the networks.
X
4.4
4.6
4.6
16
Male
i've met many of them myself. they're very nice and intelligent people.
H
4.166667
4.666667
4.5
16
Male
on the other side of the spectrum, open source p2p file synchronization program sync thing has been rebranded as pulse
H
5.333333
4.916667
5.166667
16
Male
ind.ie, spelled i-n-d.i-e.
N
4.4
4.4
4.6
16
Male
"blockchain, decentralized transactions and autonomous agents, decentralized decision making."
N
5.2
4.6
5.2
16
Male
and the line between technology and humanity becomes so blurred as to become indistinguishable.
N
2.8
3.4
4.4
16
Male
will this technological revolution be liberating or enslaving?
X
5
3.8
5.6
16
Male
if decentralized computing wins over the market, we might have a chance at a future free from centralized control.
H
4.4
4.8
5
Unknown
Unknown
and which way one goes will depend on a lot of factors, including cultural, societal, governmental, and technological.
N
4.6
4.2
4.8
16
Male
architectural problems within. many different new types of networks were invented,
N
3.2
4.4
3.2
17
Male
and encrypting email is still a somewhat unsolved problem, but i decided to tackle one side of that problem by encrypting it on the end user device.
N
3.8
5
4.2
17
Male
you could tell espionage to encrypt mail, and then when the user launched mail, it would ask them for their password.
N
3.6
4.4
4
17
Male
they're the closest that we've gotten so far that's even remotely usable as gpg,
N
3.2
3.8
4.2
17
Male
but that's still the usability nightmare, and that's sort of the next step for me is to work on making that usable while simultaneously being a end-to-end encrypting.
O
3.4
3
3.8
17
Male
back in college, when i decided to start encrypting people's email on their computers on one end point,
N
4.5
4.666667
4.666667
17
Male
do encrypted email end-to-end and encrypted communications in general end-to-end,
N
4
4.6
4.6
17
Male
and end-to-end encrypted messaging. and the biggest problem that is facing that world is authentication.
N
3.666667
3.333333
4.25
17
Male
in order for somebody to send you an email, they have to get your public key, and that's a usability nightmare.
N
3.6
3.4
4.2
17
Male
the public key for any individual could become compromised, in which case that person no longer has your accurate public team.
N
3
3.4
4
Unknown
Unknown
the problem is how do i get somebody's public key in order to send them an encrypted email? how do i know that that,
N
3.4
3
4.6
17
Male
where he said that the blockchain squares zooko's triangle? and what essentially makes it possible is for me to meet you in person or over the internet
N
2.2
4
2.8
17
Male
and end-to-end encrypted message via email or anything else. the blockchain makes that possible.
N
2.8
4.4
4.2
17
Male
this is how people are already used to. i'm conditioned to sending email. so, in order to make end-to-end encrypted email usable,
N
3
4.6
4.4
17
Male
to facilitate all kinds of different types of distributed and decentralized businesses and services...
N
2.4
3.8
2.8
17
Male
that is how identity works online today. it's mostly twitter. if you search somebody's name on a search engine, and if they have a twitter account that will oftentimes be the number one result.
N
3.4
4.2
4.4
17
Male
and for that reason, they have become almost synonymous with identity today, whereas before it used to be your website.
N
3.6
3.8
3.4
17
Male
so, these days twitter seems to be almost synonymous with identity. and then, to a lesser extent, your personal website.
N
2.2
4.4
3.4
17
Male
decide that they don't like somebody shut down their account and they've done this. similarly, nobody owns their website today. people think that they own their website,
A
3.2
2.7
4
17
Male
but they actually rent it from an organization called icann. and while fairly rare, it does happen when many different websites,
N
4.4
3.8
4.4
17
Male
et cetera. people these days tend to rent their online identities. they don't own them.
N
3.6
4.4
4.6
17
Male
nobody can take it away from you. the only way that that would be possible was if all of a sudden the developers completely changed the nature of namecoin.
N
3.6
4.8
4.8
17
Male
the blockchain is a wonderful tool for getting rid of middlemen. so, where does dns chain fit into all this?
N
4.4
5
4.6
17
Male
the problem with namecoin is that it's very difficult to get set up and running with namecoin.
N
3.4
3.8
4.2
17
Male
if you want to be able to take advantage of all of these fantastic features that it provides, you can download it and then you can have it running on your laptop,
N
4.333333
4.888889
4.222222
17
Male
except i just use it remotely via the server that it's running on. i talked to dns chain over a man in the middle of proof connection,
N
4.1
4.3
4.2
17
Male
and then all of the information in the namecoin blockchain is then... it becomes accessible to me, including all of those public keys. and those public keys can be used for gpg. they can be used...
N
3.142857
4.142857
3.857143
17
Male
and i use that term to refer to systems that provide individuals security from today's threats.
N
3.2
4.4
4
17
Male
from the sort of global mass surveillance threats that people face today in reality and any system that cannot protect users,
F
3.4
3
4.4
17
Male
that's the case. so imessage, for example, would be a protocol that does not provide meaningful security because apple holds those keys.
N
4
3.2
3.4
17
Male
and then you use that to create new keys as you're talking to them to encrypt messages, and these keys are forgotten, they're not stored anywhere. they're called ephemeral keys because of that.
N
4.2
4.8
4
17
Male
not even the people who are communicating, after the fact, can access that data and decrypt it.
N
4.2
3.8
3.8
17
Male
how does dnschain and okturtles meet this meaningful security criteria?
N
4
4.2
4.6
16
Male
the missing puzzle piece that it fills. dnschain allows people to easily obtain the accurate, up-to-date public keys for any entity.
N
4.4
4.6
4.4
17
Male
and tell the user that the connection to this website is secure, even though it's not. a fraudulent key was issued.
N
3
2.6
3.4
17
Male
but unlike today's system, users actually have reason to trust the dnschain server. they have legitimate reasons to trust them
X
3.8
5
4.6
17
Male
because either they own and operate that dnschain server themselves, or it's one of their close, trustworthy friends who is operating the server.
N
3.545455
4
3.909091
17
Male
and if that were the case, then the people living in that home don't need to ask their internet service provider. they don't need to trust anyone that they don't trust.
C
3.714286
3.285714
4.285714
17
Male
and they would be able to securely send email and various other forms of secure communication to their friends
X
4.2
4.8
4.4
17
Male
without having to rely on untrustworthy third parties that could potentially man-in-the-middle the connection.
N
1.8
3.6
3.2
17
Male
one is the ip address of the server, and since it's a dns server, they kind of already need to know that. for example, many people know google's very memorable dns server ip's,
N
4.4
4.6
4.2
17
Male
and can change the dns server's ip there, and in the case of a dns chain server running on a router.
N
3.833333
3.833333
4.5
17
Male
and then the second piece of information that's needed is the dnschain server's public key fingerprint.
N
3.8
4
4
17
Male
but the point is, is that yes, at some point you're going to have to trust somebody. if you don't trust anybody at all, you're basically out of luck.
N
3.866667
3
4.866667
17
Male
so the point of dnschain is to severely limit by orders of magnitude, the number of entities that need to be trusted, from thousands to one,
N
3.8
4.4
4.4
17
Male
their internet service provider or that they would trust the nsa who can manipulate their internet service provider.
N
3.8
3.4
3.8
17
Male
that's an interesting security model and an interesting trust model
N
3.3
4.2
4.1
16
Male
against a blockchain. so with that said-
N
3.8
4
4
16
Male
before i forget, i'd like to make a comment on the terminology. the little keyword, trustless, that you brought up.
N
3.222222
3.444444
4.111111
17
Male
to be able to use namecoin in a trustless way, you have to run a namecoin node on the machine that you are using.
X
4
4
4.8
17
Male
one of the most promising ones is called ultimate blockchain compression for unspent transaction outputs.
H
3
4.666667
3.666667
17
Male
so even if say, at some point in the future, somebody manages to get a system that uses that technology up and running. i suspect that dnschain will still be a preferable model
N
3.6
4.6
4.2
17
Male
and double-spend and things like that, but it's still extremely secure, even in the face of a 51% attack.
N
4
4.6
4.4
17
Male
so if super-alien attackers coming at our blockchain and us having to do crypto kung fu to protect our blockchain and private keys from attackers.
N
3.4
4
3.6
16
Male
we've established that a 51% attack, at most, could maybe sensor new entries into the blockchain,
N
4.2
3.8
4.2
16
Male
with very little ability to actually mess with the integrity of that data that's actually already in the blockchain.
N
3.8
4
3.8
16
Male
one other threat that's a little bit different than 51% attacks would be quantum computing. i assume that,
N
3.294118
4.058824
3.941176
16
Male
but- that is hearsay at this point in time that i cannot vouch for. i would say that, if that proves to be true.
N
3.8
3.4
4.2
17
Male
okay. that's good to know. so, if anybody out there is concerned about this stuff start investing in quantum cryptography.
N
3.8
4.6
4
16
Male
there are two projects that are involved in this: there's dnschain and then there's okturtles.
N
3.4
4
4.2
17
Male
both of which are under the umbrella of a nonprofit called the okturtles foundation. currently, most of the development has been focused on dnschain and the audience for that is very different.
N
3.8
4.2
4.4
17
Male
the point of dnschain is to make it very, very simple for applications and users to access the information in these blockchains.
N
2.333333
3.833333
3.666667
17
Male
they could, but those registration details are going to be unblinded to the person you trade with. so if you don't give your... that's why it's your payment details,
N
4.2
4
4.4
437
Male
but you can get a flavor for it. i do encourage people to just download it or you can go and get help if you want to build it yourself. look through the code,
H
5.416667
5.5
5.083333
437
Male
putting this on a cell phone would be great, getting a mobile app. i mean, that's more like a longterm aspect for us.
X
3.4
5
3.4
437
Male
i mean the luminic hand with the taser and it's like the most awesome thing you'd ever see.
H
4.8
6.4
5
542
Male
then the guy on the screen falls down and then he looks at our participants and said, anybody want to give it a shot?
U
4.8
4.6
4.8
542
Male
how do we do that? fabulous. our engineering department actually made a movie that was real high quality.
N
2.8
5
4.2
542
Male
brought it there. nice. yeah. our underground utilities guys. they had a cutaway section of a fire hydrant and it was just cool stuff like that, where we got all this stuff.
H
4
5.2
4
542
Male
we did it. whatever we set out to accomplish didn't include cookies,
H
5
4.888889
5
542
Male
but because the cookies are here, we knew we made a dif-
H
5.642857
6.142857
5.5
542
Male
well, it's no cost. that was one of the biggest challenges had at the beginning. we just put out a lot of press releases. we use social media a lot to let people know what happened.
N
2.8
3.8
4
542
Male