Archiv der Kategorie: Video
The Grappler
Outsmarting the Giant Hornets
How to catch Japanese Giant Hornets:
Appointment with Disaster
Now show me a video like this for allegedly mankind-threatening AI.
Protection Against Radiation In Uranium Mines
Sicherheitscheck
Why Bitcoin Is A Scam
How Bank Robberies Work
Classic bank robbery has fallen out of fashion in this age of digital payment and fintech. Nevertheless, it is quite interesting to hear how crime actualy works as opposed to how people are imagining it. As in all work, attention to detail maters.
Sicher bei Schnee und Eis
How To End Ransomware
Lisa Forte has a proposal how to end the ransomware pandemic, and it is a good one: Stop ransom payments. After all the perpetrators are doing it for the money, so their attacks become pointless if they won’t make any. This sounds simple but is often forgotten in favor of blaming the victims. Security is a common good.
mRNA-Impfstoffe erklärt
Weil’s so schön war und weil im Internet wie üblich allerlei Blödsinn kursiert, reiche ich noch ein Erklärvideo vom RKI weiter. Der Molekularbiologe Martin Moder erklärt anschaulich, was es mit mRNA-Impfstoffen gegen Coronaviren auf sich hat:
Leben am Todesstreifen
Attack Scenario ≠ Threat
The below video gives an example of what some people would call a threat model. For all I can tell the video leaves out some detail but is otherwise accurate. Why does it appear hilarious or silly rather than reasonable?
As a joke the video exploits a mismatch between the sensible, even verifiable analysis it presents and the ridiculous assumptions it implies. If this attack scenario manifested itself it would play out pretty much as presented. However, the implied very narrow and specific mode of operation – firing cannon rounds at computers – does not correspond with the behavior of any reasonably imaginable threat agent. Any agent with the capability to deploy main battle tanks is facing a wide range of possible uses and targets. Shooting individual personal computers remains not only far from being one of the more profitable applications of this capability, but guarantees a negative return. The cost is high and destruction of specific, low-value items promises rather limited gains. There are also much cheaper methods to effect any desired condition on the specific type of target, including its complete destruction.
While the attack scenario is accurate, it lacks, therefore, a corresponding threat that would produce actual attacks. Such a threat would exist, for example, if the assumed target were other main battle tanks rather than personal computers.
Die Säge hat Zähne
Shake Hands With Danger
New to cycling?
Are you new to cycling or taking it up again after a pause? GCN has some advice for you. All of this should be common sense but is apparently not:
5 Essential Skills Every Cyclist Should Learn
How To Ride In A City | Bike Riding Tips For Busy And Urban Streets
Bicycling Safely On The Road
Vehicular cycling advocate, John Forrester, recently passed away. The video below illustrates his ideas. In a nutshell, as a cyclist you should take yourself seriously as a road user, confidently claim the same right to the road as anybody else, and behave mostly as you would driving a motor vehicle. I have only one nit to pick: the cyclists in the video seem rather shy when it comes to claiming space, they could take the middle of the lane more often.
According to my experience, Forrester’s ideas work very well although they may take some getting used to before one can really appreciate them. Against general inclusionist trends in western societies, modern-day cycling infrastructure advocates nevertheless reject his approach, arguing that roads – or rather, segregated bike paths – should be designed for cyclists instead. In a rhetorical sleight of hand they gain approval to the truism that infrastructure design influence the safety and happiness of cyclists only to switch the general notion of infrastructure for their narrow definition later.
Dense or fast traffic can feel scary, but the real danger often looms where we least expect it. A crossroads in the middle of nowhere can be dangerous due to the angle in which roads meet. This is an infrastructure issue to be fixed by redesigning the crossroads for better visibility and perceptibility. Being advocates for a particular design, segregationists rarely discuss bicycle-friendly road design – or design objectives and tradeoffs at all.
Vehicular cycling works better on some roads than it does on others. It works where other road users do not perceive cyclists as an obstacle, either because there is ample space to pass or traffic is running so slow that passing does not really make a difference. Vehicular cycling becomes psychologically much harder for everyone when road design turns cyclists on the road into a seemingly unnecessary obstacle and therefore, a provocation. Durch designs with narrow lanes on the regular road and separate bike paths do a great job at that. Vehicular cycling would be virtually impossible here:

This road design causes the very stress bike path advocates promise to relieve through segregation. Unless you give up and comply, that is. Any honest debate of cycling infrastructure should at least acknowledge that regular roads are infrastructure and segregation is not the only viable approach to infrastructure design for cycling. If someone tries to sell you bike paths while avoiding a more comprehensive discussion of infrastructure design for cyclists, just walk ride away.
War der Lockdown umsonst?
Ranga Yogeshwar erläutert in sechs Minuten Fehler in der Argumentation, die Infektionszahlen seien bereits vor dem Lockdown zurückgegangen und der Lockdown mithin nutzlos gewesen. Es gab nämlich bereits in den Wochen davor erhebliche Verhaltensänderungen:
Wearing Your Mask, Chernobyl-Style
More and more people are wearing masks as personal protective equipment to lower the risk of coronavirus infection. Together with the growing of lockdown hair and beards while hairdresser and barber shops remain closed, this trend poses a bit of a fashion challenge. How can you wear a mask and still look great? In case you need some inspiration, the Chernobyl liquidators in the following video demonstrate smart ways of wearing a mask around the smoldering ruins of a nuclear reactor.
Car Security Forty Years Ago
Another video clip from Thames TV with a security theme, this time reporting on the insecurity of car locks and drivers’ failure to lock their cars in the first place:
Dot Con
In early March, 2000 the dot-com bubble of the late 1990s reached its peak and began to burst. The craze that had fueled this bubble was not entirely natural. Major investment banks used the opportunity to play the IPO game and were subsequently investigated by the SEC. The 2002 documentary, Dot Con, tells this part of the dot-com story:
Vorsichtig öffnen
Seit inzwischen zwei Jahrzehnten fordert man uns immer wieder auf, E-Mail-Anhänge vorsichtig zu öffnen. Wie das geht, zeigt der folgende kurze Film:
Computer Crime in the Early 1980s
This clip from 1983 allows us a glimpse into the history of computer crime. Much of what is being said still sounds familar today, doesn’t it?