• el año pasado
La seguridad en Internet es un tema crucial en la actualidad, especialmente dado el creciente número de amenazas a la privacidad en línea. El video 'Seguridad' examina estos problemas, proponiendo un futuro donde las vulnerabilidades digitales podrían llevar al colapso de nuestra sociedad hiperconectada. ¿Cuánto tiempo podría soportar nuestra infraestructura digital antes de que un nuevo sistema cibernético se estableciera? Desde ataques cibernéticos hasta sabotajes, este análisis ofrece una visión educativa y reflexiva sobre el estado actual de la privacidad en Internet, abordando las implicancias que tienen estos desafíos para todos nosotros. La cuestión no es solo cómo proteger nuestros datos, sino también cómo adaptarnos a un entorno digital en constante cambio. Este contenido es esencial para quienes buscan entender mejor las amenazas latentes y cómo estas podrían moldear nuestro futuro. No te pierdas la oportunidad de informarte sobre un tema que afecta a todos en la era digital.

#Ciberseguridad, #PrivacidadEnInternet, #AmenazasDigitales

**Palabras clave:** seguridad en Internet, privacidad en línea, amenazas cibernéticas, colapso digital, infraestructura cibernética, protección de datos, sabotaje cibernético, futuro de la ciberseguridad, adaptabilidad digital, retos de la privacidad.

Categoría

😹
Diversión
Transcripción
00:00The hackers have accessed the traffic control of some of the European high-speed railway networks.
00:12They have controlled the direction and the brakes of a sub-last model with terrifying results in power.
00:23In addition to the computerized controls of the high furnaces of a German workshop.
00:30And this.
00:45Can you imagine hearing the voice of a stranger in the baby monitor of your child's room?
00:50How scary is that?
00:52Well, something like that happened to a couple in Washington State.
00:55They hacked their baby monitor last model.
00:59But we should not be surprised, because we know that the Internet is practically everywhere.
01:04And that it can be connected to almost any device that makes my life and yours more comfortable.
01:10From phones to Facebook, we have chosen comfort before privacy, but at a price.
01:21As consumers, as citizens, as technologists, we do not anticipate the dark side.
01:28They try to infiltrate companies, steal our identity, funds, intellectual property, steal national secrets.
01:36It is different from the physical environment of war. What is the proportional response to a cyber attack?
01:43There is no absolute sense of good and evil.
01:49The tools come and go, the skills come and go, the threats come and go as usual.
01:55The culture of routine surveillance has begun.
02:00Clearly they are following us. But how much data do you have about me? And what are you going to do with it?
02:06One of the things that we are still not clear about is who does technology really work for?
02:11Does it work for the individual? For the state? For the company? For the institution?
02:25Internet keys. Security.
02:34People want devices that make their lives easier.
02:39And security is largely granted.
02:43People naturally assume that they have taken the appropriate actions, and it is rarely like that.
02:49Trying to make the Internet a safe place, a safe place, has become a multimillion-dollar industry.
02:56It is an industry designed to really do one thing.
02:59Take a step ahead of malicious hackers.
03:03Now you will have noticed that I have said malicious hackers, because it turns out that there are hackers of all kinds.
03:08White hats are the good guys, black hats are the bad guys, and gray hats are in between.
03:14My friend Sami Kamkar is one of the good guys.
03:18I got into hacking and technology when I was 10 years old, when they gave me my first computer.
03:24My mother spent all her savings on that computer.
03:27The day they gave it to me, I connected to the Internet, and it was one of the best days of my life.
03:31I connected and started searching for things on Expediente X, one of the best series.
03:35And I found a chat room where I could talk to people about the series.
03:38I entered that chat room, and immediately someone told me to go.
03:41I was like, why do they tell me to go? I said no.
03:44And they told me I had 10 seconds to go.
03:46I said it would be the typical weirdo on the Internet, so I stayed in the chat room.
03:50And 10 seconds later, my computer crashed.
03:53The screen went blue.
03:55I had no idea what had happened.
03:57My mother had spent all her money, and I was scared that the computer had been damaged.
04:01But at the same time, I thought it was the coolest thing in the world.
04:04How could I do that?
04:06Hacking in the mid-90s was very different from how it is conceived today.
04:12There were no malicious intentions.
04:14There was no theft.
04:16It was all driven largely by intellectual curiosity.
04:20Driven by that curiosity, Sammy, who at the time was not even old enough to drink,
04:25found out how to hack MySpace, a pioneering and very popular social network.
04:31When he finished, everyone who visited his MySpace page
04:35found the phrase, Sammy is my hero, on his MySpace page.
04:40Basically, he had created a worm, a virus,
04:42and there was no way to stop it.
04:45Sammy's curiosity infected more than a million MySpace users
04:49and forced the company to close its page for 24 hours.
04:54MySpace did not report me, but the government did, for creating the virus.
05:00In the end, I accepted an agreement.
05:02I would not touch a computer in three years of my life.
05:05Now Sammy makes a living looking for vulnerable points in products that can be connected to the network,
05:09such as refrigerators, cars, and babysitters.
05:13Everything we have now has technology,
05:16whether it's the garage, the car, or even the door lock.
05:19I want to see how the system should work and how we don't want it to work.
05:24Sammy is part of a group of new international professionals,
05:29the young white hat hackers,
05:31hired to access impenetrable systems and seal their cracks.
05:35Welcome to HackerOne.
05:38Is that safe?
05:40I hope so.
05:42Companies that want to identify vulnerabilities that are difficult to detect, or bugs,
05:47often offer cash rewards, the so-called bug bounties.
05:51And like a cutting-edge technology talent hunter, HackerOne connects talent to the mission.
05:56We use the term hacking, but we must stop considering it something related to criminals.
06:01It's a very diverse community of software engineers,
06:03handlers, amateurs, academics, security researchers.
06:07Microsoft has paid a reward to a five-year-old hacker who mocked parental controls on his Xbox.
06:13Google has done the same to a seven-year-old hacker.
06:17Technology bugs are everywhere, and anyone is capable of finding them.
06:22This is the Uber reward program.
06:25We're talking to a hacker named AimDB.
06:28And you see he's talking to a member of the Uber security team
06:31to understand the troubleshoot he found.
06:35What's most surprising to me, looking at this chain,
06:38is just how friendly the conversation is.
06:41That's a little bit like, hey, I found this bug.
06:44And they're like, hey, yeah, you've got the money. Here's some money.
06:47It's a conversation.
06:49It's the ideal response that we'd like to see in a company.
06:54It's good to see this type of cooperation,
06:57but it wouldn't be necessary if the vulnerabilities weren't so serious in power.
07:01What stops a white hat hacker from becoming a bad guy
07:04if he finds a very good vulnerability?
07:07The same thing that stops your medical doctor from taking a kidney
07:10and selling it in the black market.
07:12We rely on ethics and laws and the morals of people.
07:16The number of rotten apples that would use that knowledge
07:20with a criminal or evil purpose is relatively small.
07:23And nothing will happen as long as we're prepared for it
07:26and we anticipate that eventuality.
07:29Crime has obviously been with us since the dawn of civilization.
07:34Technology only makes it easier for someone to automate their attacks,
07:38to make them more important.
07:40That's why now we can have a guy in Europe attacking someone in the United States
07:44without a great deal of effort.
07:46And that's why it's so different now.
07:50That morning I was busy.
07:53I was answering emails and watching TV when my mother called me.
07:56She told me she had problems with her computer
08:00and she's using words like hijacked and these things without shame.
08:06First I realized that my computer was going incredibly slow.
08:11And then I saw the message there.
08:15All your files are encrypted.
08:18Welcome to the world of Ransomware,
08:20a virus that is surprisingly easy to infect.
08:24Usually Ransomware is introduced through an unsolicited email.
08:29This is usually a cybercrime.
08:32Someone manipulates an email address from someone we know,
08:36changes a letter or a punctuation mark,
08:39and when you open that email and you click on the link,
08:42your computer is infected.
08:44Then the virus takes over all the personal files on the computer
08:48and blocks them, encrypts them, with something called a key.
08:51Without that encrypted key, everything on our computer is inaccessible.
08:55It's lost forever.
08:57Unless we pay.
08:59That's why it's called Ransomware, because Ransom means rescue.
09:02Ransomware is very profitable and popular
09:05because most people don't have copies of their files.
09:09I had a lot of photos of my granddaughter, but no copies.
09:14They were unique.
09:16But anyway, a clock appeared that said,
09:18you have to pay in seven days.
09:23And they wanted $500.
09:26And I said it was in Russia or Ukraine.
09:31I had to do it.
09:33I didn't have a choice.
09:36It's incredible to see how many people have been victims of this,
09:40how many companies pay the ransom.
09:43They don't have to get everyone's ransom,
09:45but if only 10% pay, it's hundreds of millions of dollars.
09:51My mom paid the ransom and she got her files back.
09:55There's no getting around it.
09:57Either you get sick of it and you don't have the files,
09:59and you have to start from scratch,
10:01or you pay the ransom because those files are very valuable to you.
10:05Ransomware has become a powerful and international criminal company.
10:10In the first three months of 2016,
10:11private individuals, government agencies, police departments and hospitals
10:16paid more than $209 million just to access their own files.
10:21And when such serious amounts of money are moved,
10:24the Secret Service is also moving.
10:27Good afternoon, everybody.
10:29Let's start.
10:31What do we have this week in the city?
10:33The Secret Service is doing a dual mission.
10:36Fundamentally, it protects the President of the United States
10:38and the most important elected officials.
10:41The other side is the mission to investigate the Secret Service.
10:45We investigate the economic crimes
10:48and the use of computers that can attack the economic infrastructure
10:51and the financial markets of our nation.
10:55Good morning.
10:57Today we will execute an arrest warrant for the Lunar Eclipse operation.
11:00We have credible information about a suspect
11:03who has been located in the lower Manhattan area.
11:05The suspect is a 40-50-year-old white man.
11:09He was last seen on the first avenue.
11:12We're going to execute three teams.
11:14If we think of bank robbers,
11:17we probably think of mountain robbers, weapons and explosives.
11:20But modern thieves know that real money is no longer in the physical world.
11:25One of the biggest bank robberies in history was a cyber crime.
11:29In 2013, some high-level hackers
11:31stole $40 million from thousands of cash registers around the world.
11:35And all in just a few hours.
11:43The hackers infiltrated the computer system
11:46of a company that manages credit cards from a bank in Oman.
11:50This was a logistical cyber crime like Oceans Eleven.
11:54The hackers found a vulnerability
11:57on the company's payment processing platform.
11:59They eliminated the limits of hundreds of prepaid debit cards
12:03and then printed them in the three-dimensional world.
12:06Then they distributed the cards to a wide network of so-called street cash registers.
12:10Thieves located in cash registers in dozens of countries
12:13who were ready to enter the card, collect the money and run away.
12:18There were hundreds waiting for them to be given the PIN.
12:22And then, like a clock...
12:25They release the PIN number.
12:26These individuals go to the cash register and withdraw the funds.
12:35This was a very large pyramid.
12:38And at the top were the hackers,
12:41then the coordinators and then the field operatives
12:44who simultaneously withdrew money in 25 countries on five continents
12:48for a total of more than $45 million in 12 hours.
12:53The Internet made this crime possible.
12:56But remember, not all cybercriminals are bright minds.
13:01There were two individuals who were brave enough
13:04to publish on their social networks that they had stolen a large amount of money.
13:08And they proceeded to take a selfie with a lot of money.
13:12And that was one of the methods used to make arrests in this case.
13:22Cyberintrusions are a relatively new field.
13:26It has only been with us between 5 and 7 years.
13:29It is usually something international.
13:32It can emanate from Canada, Eastern Europe, Finland, Russia, Australia...
13:37And everyone uses the same tool, the Internet.
13:412015 was a record year for international cybercrime
13:45and cost the world $400 billion.
13:48But not all cybercriminals do it for the money.
13:52Think of the famous hack of Sony Pictures,
13:55for example, a work allegedly by the North Korean government.
13:59It's a devastating hack,
14:02crippling one of the world's most powerful entertainment studios.
14:05No one knows why the North Koreans leaked thousands of embarrassing corporate emails,
14:09numbers of social security, employees and even movies waiting to be released.
14:14Fury and the remake of Annie were posted on illicit websites.
14:18Why did North Korea go after Sony?
14:21I don't think it was because they wanted to enter the movie business.
14:25One theory is that they wanted to respond to a Sony movie, The Interview,
14:29a comedy that featured the murder of their beloved leader.
14:33President Kim Jong-un.
14:35What you gonna do? What you gonna do?
14:38Think about that for a second.
14:40That means that a country attacked a company.
14:43It's pretty crazy.
14:45The North Korean regime has called the movie terrorism, an act of war,
14:49a moral attack on its leadership.
14:51They thought it was a direct attack on the North Korean regime.
14:55They didn't like the movie. They didn't like what it said.
14:58Did you just say dong?
15:00The movie was crude, but the cyberattack was sophisticated.
15:04They specifically targeted administrators and stole their credentials.
15:09So they actually had privileges at the level of an administrator across the network
15:13across the whole system.
15:15To me, it was an incredibly important moment for the United States
15:19because it wasn't just an attack on a company and its employees.
15:23They actually threatened all the theaters across the country.
15:27People were scared.
15:29To me, that's terrorism, and that could have very serious consequences.
15:32I think the United States government still doesn't have very clear rules
15:37when it comes to when it should step forward to defend its property
15:41and the rights of a company.
15:44So, let's imagine that a state acted against Lockheed Martin, for example,
15:49or some other vital infrastructure that's in private hands,
15:53or against our health care insurance, or against the private sector,
15:57or against the financial sector, where I have my money
16:01and I can't receive anything from a cashier.
16:04I mean, at some point, we're going to have to figure out where this line is,
16:08where does hacking become an act of war?
16:13As you know, recent reports suggest that the air force's space control was hacked.
16:18We don't know if there was a serious leak.
16:21We believe that the access route occurred through a subcontractor
16:25that is part of the defense's industrial base.
16:28We don't know what they got, but we believe that our GPS system has been compromised.
16:33Okay, at this point, these issues of national network security are not going to form a scale.
16:39What is the security that's going to take care of blocking nuclear warheads?
16:43What is the security that's going to take care of protecting our GPS system?
16:47These are very vital questions, and the consequences of doing wrong are extreme.
16:53Here at West Point, instructors like Major Sean Lonergan
16:56analyze these questions in an intense way
16:59as they train the next generation of soldiers to be cyber warriors.
17:03The United States has enjoyed, since its founding, great security.
17:08We have friendly neighbors in the north and the south,
17:11and our two best allies, the Pacific and the Atlantic, normally protect us.
17:15But now, cyberspace is the only war zone where we face rivals at our level.
17:20There are people abroad who can touch us and attack the United States,
17:24and that's a concern for us.
17:27Do you think we should give access to the civilian sector to military GPS?
17:31If the global positioning system based on satellites were hacked,
17:35as in this exercise, you would be surprised at how serious the consequences would be.
17:40Without GPS, there is no tracking of targets, there are no guided missiles.
17:45But the biggest impact would be in agriculture.
17:50Now GPS is used to sow, water and harvest.
17:54And if we remove the GPS from that equation,
17:58those machines will not know where they are.
18:01We would lose billions of dollars.
18:04So what happens if we consider Pakistan responsible, even if it is not the culprit?
18:10One of the big problems in cybercrime and cyberwar is attribution.
18:14It's one thing if you rob a bank,
18:17and there is a picture of us entering the bank,
18:20and it's clear who has stolen the bank.
18:23But if another nation attacks you in cyberspace,
18:27and you don't know who has attacked you as a nation, what can you do about that?
18:31It's a new war.
18:33In the old days, countries needed long-range missiles to attack.
18:37Now you can do a lot more damage with little more than a keyboard.
18:41We know that there are attempts to access the infrastructure of this country,
18:46but not just our infrastructure.
18:48I think we are seeing more and more of these persistent threats.
18:52The hacker activists, the criminals, the states,
18:55on many occasions we don't even know what they want to achieve.
18:58In 2016, the Department of Defense allocated 5.5 billion dollars to cyber operations,
19:04and a high percentage was dedicated to the US Cyber Command.
19:07But ironically, one of our biggest strides in cyber defense
19:11was due to a terrifying attack where cutting-edge technology did not intervene.
19:29There are many good reasons to have a strong intelligence agency in any country.
19:34The idea is to be able to detain people who are suspicious of criminal acts,
19:40who buy materials to make bombs,
19:44who try to launch nuclear programs,
19:47things that are very destabilizing and dangerous on a large scale.
19:51The former NSA contractor, Edward Snowden,
19:54was the first to reveal how a program designed to look for terrorists abroad
19:58was used in a generalized and secretive way after the 11-S
20:01to spy on American citizens.
20:05I worked at the NSA.
20:08I worked directly with the massive surveillance tools in my last job in Hawaii.
20:12I could see the world's internet traffic.
20:15Sitting at my desk, I could type in any name,
20:19any phone number, and pull up the associated files of that traffic.
20:24Now, there are some legal restrictions to the use of this tool
20:30To spy on an American, for example, you need a court order.
20:35But technically, it's already in the system.
20:38You just have to look at it.
20:40Of course, the NSA had a lot of help.
20:43The ability to track was already included on the internet.
20:46Companies like Apple, Google, Microsoft, and Facebook
20:50collect, store, and happily sell data about their users.
20:54In other words, us.
20:57You know, a lot of people are worried about government agencies spying on them,
21:02but they don't seem to be worried about Google or AT&T
21:06or AT&T, who are handling their data minute by minute,
21:10and in fact, can do pretty much whatever they want.
21:13We have to be aware that when we use the internet,
21:17the byproduct of our daily activities in the modern world
21:21is that we produce records.
21:23And when we connect to Google, or Facebook,
21:26or our government, or our insurance,
21:29when we connect to an Amazon purchase record,
21:32we are creating the perfect records of our private lives,
21:38as has never been seen in the history of the world.
21:42A culture of routine surveillance has been inaugurated.
21:48But despite the fact that we have them,
21:50despite the fact that they have us in their hands,
21:53we respond by shrugging our shoulders.
21:56Hey, Facebook listens to us.
21:58Maybe Apple listens to me through my iPhone.
22:01I just sit down and they listen to me.
22:04We've all become identified bears.
22:08We put the radio collar on ourselves.
22:11It's called a smartphone.
22:13Now, this attracts us as efficiently
22:16as any radio collar we could put on our neck.
22:18So, without knowing it, we are co-conspirators
22:22in our own loss of privacy.
22:25Many companies have learned how to make money
22:28from all the personal data we have given them.
22:31Our habits, what interests us,
22:33very valuable personal information for advertisers.
22:36A company has discovered that there is still
22:38very personal information that has not been obtained,
22:40nor profited.
22:42Hello.
22:44Hi, how are you? I'm Derek.
22:46Me too. It's a good name.
22:48Do you have a card?
22:50Sure.
22:52What do you call this?
22:54This is called a sociometric card.
22:56It's like your company's identification card
22:58with sensors that allow you to control
23:00how members of an organization relate to each other.
23:02Humanize is a startup based in Boston
23:04that has taken tracking technology
23:06to a new level,
23:08and to a new place,
23:10the workspace.
23:12We really want to take all the data
23:14that is important for human interaction.
23:15Many companies accumulate data about their clients,
23:17but if I ask a company
23:19how much the engineering team
23:21talks with the sales team,
23:23they have no idea.
23:25We have two microphones on the card,
23:27one up and one in front.
23:29They don't record what you say,
23:31but we do a voice processing in real time.
23:33Right now, they're capturing the percentage of time
23:35that I'm talking,
23:37my voice tone, how loud I speak.
23:39The idea is that if I start speaking a little faster,
23:41that indicates something about our conversation.
23:43We also have information about proximity.
23:45If I have a card,
23:47it tells us that I'm talking to you,
23:49that is, it tells us who I'm in the office with.
23:51We also have a motion sensor,
23:53just like your cell phone,
23:55but really the idea is that if we have two teams
23:57that talk a lot to each other,
23:59we know where they're talking
24:01and how that can change
24:03the way people collaborate.
24:05The card records about 4 gigabytes
24:07of data from your carrier every day,
24:09and when a company signs a contract with Humanize,
24:11it buys the ability to track its employees
24:13with an amazing level of detail.
24:15All right, so these are two different types
24:17of position sensors,
24:19and we've got some very interesting things.
24:21What were you doing between 3.24 and like 3.30?
24:26I was probably lost sitting in a chair
24:28reading something on the phone.
24:30Okay, so essentially,
24:32we can see that there's this 10 minute period of time
24:35where you're in your own world there.
24:38And I think what's important here
24:40is not to say that we don't see these things
24:42individually,
24:43and we don't show this data to anybody,
24:45not even to our customers,
24:47but having this specific level of singularity
24:49among thousands or hundreds of thousands of people,
24:52imagine what you can learn
24:54about what's actually going on in a company.
24:57This would have been unthinkable 50 years ago,
25:01the notion that we're constantly being watched.
25:04It's the sort of thing that Orwell wrote
25:06and that we were scandalized about.
25:09Humanize analyzes the information
25:10from a group of employees
25:13to get the general picture.
25:15But the data they collect is so specific,
25:18so individual and so personal
25:20that it's hard to get used to it.
25:22Do you think that in three to four years
25:25all the identification cards will be like this?
25:28Oh, yes, I expect that in three or four years
25:31most of the identification cards
25:33will have these sensors.
25:35But the question is, what will you do with the data?
25:37Humanize insists that the data
25:38collected by the employees
25:40must remain anonymous.
25:42But it does make us think about
25:44the possibilities of this technology.
25:46I mean, the key is trust.
25:48Do you trust your boss not to spy on you?
25:51Because they certainly can if they want to.
25:54In the United States, at least,
25:56we know that the bosses can read our emails,
25:58register our activity on the keyboard,
26:00record us on a closed circuit,
26:02or even with our webcam.
26:04Now, most employees don't mind,
26:06but some are pushing back.
26:09I was in charge of sales at Intermex.
26:12It's a company that makes bank transfers
26:14between the United States and South America.
26:17My territory included from central California
26:20all the way to the coast of California
26:22and then all the way to Santa Cruz.
26:24So it's quite a lot to do there.
26:26The company wanted to implement a new program
26:29where they had an app
26:31downloaded onto their phones
26:33and this app was supposed to track
26:35everyone around you
26:36to the very smallest detail.
26:41Thanks to the iPhone's built-in GPS,
26:43the app tracked Mirna
26:45wherever she went and recorded
26:47how long she stayed in one place.
26:49Their bosses even knew
26:51at what speed she was driving
26:53and they wouldn't let her turn it off.
26:55They were following me all the time.
26:57So I felt, I don't know,
26:59watched all the time.
27:01I never said no at work,
27:03but they not only didn't follow me,
27:04but they recorded where we were going.
27:06What did they keep the data for?
27:08How much data did they have on me?
27:10And what were they going to do with it?
27:12All of that scared me.
27:14So another colleague and I
27:16decided not to use the app
27:18and we were fired immediately.
27:20Mirna sued her company.
27:22I was surprised by the disgrace in this
27:25that occurred here.
27:27I'm not surprised that a boss
27:29would try to follow his employees
27:31and we know from experience
27:32that our bosses take a lot of liberties
27:34with our right to privacy
27:36and on many occasions
27:38when we enter the office
27:40they tell us that our time is theirs,
27:42that we use their machines,
27:44that they have a right
27:46to see what we do.
27:48But that was before the internet
27:50invaded our workplaces.
27:52The scenario is very different
27:54when you have people on the street
27:56and especially when you use
27:58the same device to work
28:00as for your personal use.
28:02You can't control what they do
28:04during their breaks
28:06and after work.
28:08That scares me
28:10and I think it scares Mirna as well.
28:12So if our bosses
28:14and Google and our government
28:16are all trying to track us,
28:18what are we supposed to do?
28:20Just throw our smartphones
28:22and disconnect from the internet entirely?
28:24Let's face it,
28:26that's never really going to happen.
28:28So the other extreme is
28:30we can throw our privacy
28:32away.
28:34Welcome to Songdo,
28:36South Korea.
28:38Its developers call it
28:40the city of the future.
28:46Before 2001
28:50all of this was underwater.
28:55To build Songdo
28:57the planners first had to
28:59claim 600 hectares
29:00If you were expecting autonomous cars, flying cars and mobile roads, well, you won't find it here.
29:07But what you will find is the highest skyscraper in the country, the longest bridge and, most importantly, interconnectivity.
29:14Because Songdo was built literally from its foundations to be a smart city.
29:19As it was built from scratch, it was easy to integrate a network of sensors throughout the city.
29:25And just as easy is to forget that in Songdo, we are being watched.
29:31This is the Integrated Operations Center.
29:35Here, operators monitor all vital functions of the city.
29:38From traffic, weather conditions, public transport and emergency response,
29:43to advertising fences, energy consumption and waste disposal.
29:48This room is the brain of the city.
29:51Traffic is not only monitored from here, it is also controlled.
29:54Operators can control the synchronization of traffic lights and use signals to redirect traffic flow.
30:00The system has a database with all the country's license plates.
30:04It knows all the cars in Songdo.
30:09And the security cameras distributed throughout the city act as an omnipresent police force.
30:15They observe and report suspicious activities in real time.
30:19Brian Bailey is Product Director at Samsung Biologistics.
30:22He moved to Songdo with his family in 2014.
30:27We've lived in several places.
30:29Songdo is the safest city we've ever lived in.
30:33We feel very safe with our children.
30:36We let them go around the city alone.
30:39We don't have to worry about their safety.
30:43There are obvious advantages to living in the city of the future.
30:48The Internet is everywhere.
30:50So anywhere you go, you have a very good Wi-Fi signal.
30:54The buses have it, the subway has it, as well as all the cafes, restaurants and stores.
31:01So being able to have access to the Internet is very convenient here.
31:07But in Songdo, privacy is practically non-existent.
31:12You can't do anything without a camera recording you.
31:15I've heard that in the center they put a little dot for the camera and they follow you for hours all over Songdo.
31:21Really? They can follow you for hours?
31:24Thanks to the facial recognition software, they know where you are.
31:28And what do you think of that?
31:30We feel spied on everywhere.
31:33You feel spied on?
31:34Yeah.
31:35You go down the street and there are eyes everywhere.
31:41You can't do that.
31:42No.
31:43Not anymore.
31:46When we put the cameras, people felt that we were invading their privacy.
31:50However, that changes when an incident occurs.
31:54People say, there are no cameras in our area.
31:57Install them near my house.
32:00When you're in Songdo, do you think of the cameras that are filming you?
32:04On the street, I'm not aware of it.
32:07I have not committed any crime, so why should I worry about the cameras?
32:12Saying that you don't care about privacy because you have nothing to hide
32:17is the same as saying that you don't care about freedom of expression because you have nothing to say.
32:22But that's a harassment to understand what the rights are and what privacy really is and what it's for.
32:30Privacy is not about having nothing to hide.
32:33It's about having something to protect.
32:36And in a free and open society, that thing is freedom.
32:41One thing we've learned from Edward Snowden is that our government has a voracious appetite for data,
32:47including data from American citizens.
32:49And that's the thing about the United States, it's a sophisticated democracy.
32:53People around the world are even less protected from their governments.
33:00And what can happen if we forget that the phone we have in our pocket is also a surveillance device?
33:05In 2014, the protesters in Kiev found out.
33:13After a confrontation with the police, the protesters in the area received a threatening text message.
33:18Dear user, you have been registered as a participant in a violation of the mass public order.
33:25So, the cell phones and surveillance cameras are obviously elements to be avoided if we don't want to be followed.
33:31But is there any way to prevent us from being followed if we connect to the Internet?
33:36Well, it turns out that there is a very interesting tool that does exactly that.
33:40It's a special browser called Tor.
33:43Assuming someone doesn't know what is Tor.
33:46It's a solution to a problem that a lot of people don't know they have on the Internet.
33:51I've been consulting the New York Times before, and this is all that has been loaded.
33:57It has gone to a place called s.motaz.com, to another called inworldwide.com, and to another called clicktail.net.
34:04And all these people have gotten my data.
34:07They all follow me.
34:09A lot of money is moving in the tracking of the web browser of completely normal people.
34:13And it's something that's not very regulated in the United States.
34:17So how does Tor solve this problem?
34:20Well, Tor uses a technology called routed onion.
34:23By which you divert traffic through several different computers run by volunteers distributed all over the world.
34:30Tor gets its name from routed onion.
34:32Because it creates several layers between us and the indiscreet eyes that can conceal our identity.
34:38That in the center is my computer.
34:40When I click on a link, my request travels from my machine to the number one volunteer machine that is somewhere else in the world.
34:48Automatically sends the request to the volunteer number two, who does not see me.
34:52Then his machine sends the request to the page I was trying to see.
34:56But that page and its tracking software only see her.
34:59They do not see me in any way.
35:02All that complexity is what protects our privacy.
35:07Here we can go to the New York Times.
35:10And we see that our traffic has been transmitted through a post in Germany.
35:15Another post in France.
35:16Another post in France.
35:18And then it has gone to the Internet.
35:20So none of those websites get your information.
35:23Exactly.
35:24But they receive the information of the last transmission.
35:26That's it.
35:27And what kind of people use Tor?
35:30Well, we have human rights volunteers and activists in different countries.
35:34We have victims of gender violence who are trying to get some security in the communications.
35:40We have normal people who do not want to be watched by different governments or advertisers.
35:46And we have advocates of crazy privacy like me, who like the idea of ​​not sharing about ourselves.
35:54Nothing more than the essential.
35:56Tor makes manifest the conflict that our society is facing right now.
36:00Because we must remember that Tor was funded by the government.
36:04The Navy put the money for the development of Tor.
36:07Because it was aware that spies also needed to communicate safely.
36:11And that they were at risk.
36:13There are many people in the world who live under repressive governments.
36:18And they try to carry out social changes that could be unpopular.
36:22I want those people to have the privacy they need to do their job.
36:26And I know the next question is, will the terrorists use it?
36:30The answer is yes, of course.
36:32But also the activists.
36:34The security of devices, whether it's our computer, our phone, or our washing machine,
36:41is a binary state.
36:44Meaning there are only two possible options.
36:47It's either secure or it's not.
36:50There is no option to make a device secure against bad guys,
36:56but insecure against good guys.
37:00Or all of us are secure.
37:02Or none of us are.
37:11So here we are.
37:12At the crossroads between internet security and freedom.
37:15We don't mind if Google follows us, but we don't want our government to do it.
37:19We know that internet can be hacked, but that doesn't concern us enough to stop using it.
37:23In fact, we can't stop using it.
37:26We depend on it.
37:27We are addicts.
37:28Our finances, relationships, our work.
37:30Now our whole life is online.
37:32But our virtual lives don't really live in the clouds or cyberspace.
37:37They live inside brick and mortar buildings, like this one in the lower Manhattan area.
37:42And when we see the kilometers of cable and all the physical infrastructure
37:46that our online lives have to go through,
37:48the internet seems less magical, more physical, and possibly more vulnerable.
37:55When I think of the internet, I often like to forget the abstract
37:58and stand in a specific place and think of all the communications that go through that spot.
38:03It's interesting.
38:0460 Hudson Street in New York is one of the most important internet buildings in the world.
38:09And it's a single building.
38:11I can send a text message to Helsinki this afternoon and with the right tools,
38:15say, okay, it went through this building, this building, and this building, and then this cable.
38:19And when you see the path it's taken, you see that it's been a real, physical path.
38:23It's been through real places on the map.
38:26In the world, there are only 12 points of internet exchange as big as this one.
38:30But there are hundreds smaller, distributed all over the planet.
38:34And according to internet designers, that distribution makes it safe, or at least safer.
38:41It has billions of parts, each of which operates independently.
38:46And so, there isn't any master switcher that turns everything on.
38:51And that's a good thing. It makes it more resistant.
38:54It means no one can threaten to turn it all off because they can't.
39:01My handle is Mudge.
39:02I and the six individuals seated before you make up the hacker group known as The Loft.
39:08Back in the 90s, there was a security investigator, Mudge,
39:12who testified to Congress that he could turn off the internet in 30 minutes.
39:17The last time I talked to him, he said it would take an hour.
39:21The internet is absolutely safe.
39:24However, the internet heals.
39:27The internet is not a thing anymore.
39:30It's a combination of millions of things.
39:33So, if someone is able to coordinate an attack against those systems,
39:36it will hurt them, it will leave them out of service for a season, but it will never be able to kill them.
39:42Nature could have something to say about it.
39:46Solar radiation can make electronic devices unusable.
39:50In 1859, a super solar storm bombed the earth and wreaked havoc on the internet of the 19th century.
39:56The telegraph network.
39:58Solar storms occur constantly, but this one, known as the Carrington event, made history.
40:04A rain of sparks sprang from the telegraph machines,
40:07and the messages burned in flames.
40:10We've had solar storms in 2012, 2013, and 2014.
40:14That's why scientists believe that a second Carrington event is a matter of time.
40:19Only today, our electronic dependence is thousands, even millions of times greater.
40:24And at the center of it all is the internet.
40:29So, what would really happen if it all suddenly went down?
40:33It's 5 a.m. in New York.
40:35The night watchers have been noticing for an hour that Google has gone down.
40:39At approximately 6.30 a.m., Amazon, the New York Times, and ESPN.com are dead.
40:46Facebook goes down an hour later.
40:48At 8 a.m., all the trains in New Delhi have stopped.
40:51And the air traffic control from Norway to the Mediterranean is out of service.
40:55Hundreds of flights are left on the ground.
40:57At 10.53 a.m., all the traffic lights in Manhattan turn green.
41:01London reports that the medical records of 160 hospitals have been erased.
41:05Customers whose last name starts with the letter M
41:08discover that their bank accounts have suddenly been emptied.
41:11In 12 different banks.
41:13At 4 p.m., China has denied being involved, as has Pakistan.
41:16Iran was denying its involvement when diplomatic telephone lines were cut off.
41:20At 7.22 p.m., the lights in Norway go out.
41:23No electricity, no subways, no water.
41:26On the roads, mass gridlock.
41:28The lines, stretching for miles.
41:30The Internet is paralyzed.
41:32And there are always ways for that to happen.
41:34Rare ways, but that could happen.
41:36Our financial systems would collapse.
41:38Our transportation network would collapse.
41:40The power system, the water system, the natural gas distribution,
41:44the telecommunications systems, would collapse.
41:47We would have no electricity.
41:49How do you think a city like New York would be
41:52after not having power for six months?
41:54Which also means that there would be no police communication,
41:58no fire service, no water.
42:01How would people survive?
42:03How many of us know how to make fire without matches?
42:06I do.
42:08I don't know my children's phone numbers.
42:10I mean, that's crazy.
42:12My iPhone knows my children's phone numbers.
42:15When I was little, we all knew like 20 numbers
42:18of our friends, parents, and relatives.
42:20Now we leave the memory on our devices,
42:22and we depend a lot on them.
42:24And there's no backup for the Internet, right?
42:27If there was something, if there was a virus
42:29that would end the Internet,
42:31it's incredible how quickly it would end civilization as well.
42:34The good news is that there is SurvivorLibrary.com.
42:37It's a library where you can find
42:39all the information you need to survive.
42:42From embalming to building carts,
42:44it's the dream of any survivor.
42:46But instead of weapons and food,
42:48it's a reserve of knowledge.
42:50But the bad news?
42:52It's on the Internet.
42:54But even when solar winds and the dreadful hackers
42:57don't finish it off,
42:59even when the Internet is functioning normally,
43:02our precious information is still there.
43:05It's still there.
43:07It's still there.
43:09I mean, remember these?
43:11Or this?
43:13The same fate of obsolescence
43:15awaits all the storage formats
43:17we use today.
43:19We have another huge problem
43:21that we know very well,
43:23and that's the possibility
43:25that all the digital content
43:27is not correctly interpretable
43:29in 100 years,
43:31because the software that knows what it means
43:33doesn't work anymore.
43:35So that's another problem.
43:37The threat of a digital age in full swing.
43:40The reality is that obsolescence
43:42has always been around us.
43:44It doesn't matter if it's about transportation
43:47or technology.
43:49It happens.
43:51When it comes to things like
43:53archival storage,
43:55you, as the custodian of something
43:57that we believe should be preserved
43:59for future generations,
44:01need to be prepared
44:03for the fact that
44:05future generations
44:07need to be prepared
44:09to keep re-copying it
44:11to the media of the day
44:13that seems to have some longevity.
44:16That's just life in a big city,
44:18and it's frustratingly annoying
44:20constantly.
44:22But sometimes the problem
44:24is not the technology.
44:26Sometimes it's the simple law of life
44:28that causes very valuable information
44:30to disappear.
44:32One thing we've discovered
44:34is that the internet
44:36only lasts about 100 days
44:38before a page is changed
44:40or deleted.
44:42100 days.
44:44Sometimes it's involuntary.
44:46Often it's for commercial reasons,
44:48when companies make the decision
44:50to delete the work
44:52that you've been putting
44:54on their websites.
44:56Keeping old stuff alive
44:58is not easy.
45:00So the goal of Internet Archive
45:02is that it doesn't depend
45:04on a physical element
45:06for a company to stay alive.
45:08The invention that defines
45:10Internet Archive
45:12is the time machine
45:14that takes instantaneous
45:16web pages at regular intervals
45:18so that if the content changes
45:20or a company ceases its activity,
45:22that material is not lost forever.
45:24Today, web pages are kept
45:26using a complicated algorithm,
45:28but the ultimate goal
45:30is to collect web data.
45:32There were probably only 30 million pages.
45:34Now we're collecting
45:361,000 million pages a week.
45:38Our total collection is about
45:40500 million pages
45:42that are in the time machine.
45:44Archive employees in San Francisco
45:46and around the world
45:48are constantly digitizing
45:50printed materials, videos, games
45:52and operating systems,
45:54all kinds of ephemeral products.
45:56All participants in the project
45:58of Internet Archive
46:00have at least one thing in common,
46:02hopes for the future.
46:04The servers in this room
46:06are 5 petabytes of data
46:08and that's the primary copy
46:10of Internet Archive.
46:12I've been designing supercomputers
46:14throughout my career
46:16and the great thing about them
46:18is that the lights do mean something
46:20every time a light flashes
46:22is that there's someone
46:24going up or down
46:26and that's where all our knowledge
46:28and all our weaknesses come from
46:30and it's all in the most versatile
46:32and extraordinary invention
46:34of humanity.
46:36If you think about it,
46:38our whole civilization
46:40depends on this infrastructure
46:42from the moment we wake up
46:44to the moment we go to sleep
46:46to the moment we're born
46:48to the moment we die
46:50and all the intermediate steps.
46:52I think it's been a quarter century
46:54and we have achieved what we believed
46:56where are we?
46:58Do we need to change course?
47:00I'm a huge optimist.
47:02I think when we have this conversation
47:04on our 50th birthday,
47:06on the 75th,
47:08on the 100th anniversary
47:10of commercial Internet,
47:12we will say that we have built
47:14a society that has taken the best
47:16out of this infrastructure.
47:18Right now, the Internet
47:20is a tool, a very powerful tool
47:22and we have to figure out
47:24how to use it best
47:26and like any tool,
47:28it depends on who's using it
47:30and why.
47:32Since there will always be good guys
47:34and bad guys,
47:36we'll have to stay vigilant.
47:38But there's more.
47:40If we think about those exponential growth curves,
47:42we're in one of those moments
47:44where we're about to jump up
47:46and do this.
47:48Technology is a living thing.
47:50It is an organism.
47:52It is an extension of us.
47:54Some very smart people have warned
47:56that at any moment
47:58the Internet could evolve.
48:00It could become something
48:02more than just a tool,
48:04perhaps an intelligence
48:06capable of using its own tools.
48:08But where would that take us?
48:10You know, I worry a lot about
48:12just pure mankind
48:14the way these technologies
48:16are emerging
48:18and, you know,
48:20what our role is
48:22in these systems and machines
48:24that are surrounding us
48:26and it's not clear that
48:28we can be the masters
48:30for our destiny in the future.
48:32We're in an amazing time
48:34to be alive.
48:36Today we have 14 billion devices
48:38connected. My phone, your TV,
48:40my Tesla car,
48:42there's 14 billion devices connected
48:44and we'll get to 100 billion
48:46in 2020.
48:48We're heading for a world
48:50where everything will be
48:52in images and will be recorded
48:54and we'll be able to do anything
48:56we want, whenever we want,
48:58wherever we want.
49:00This is our billion-sensor economy
49:02and how you combine that data
49:04and what questions you ask
49:06is what's really changing
49:08the way we live our lives.
49:10I'm not as stupid as I am
49:12to make predictions about the Internet
49:14and I will assume
49:16that the Internet will be omnipresent,
49:18I will assume it will be noisy
49:20and rowdy,
49:22I will assume that it will be
49:24a mix of controlled
49:26and fiercely independent
49:28and that will be complicated
49:30and a blessing and a curse
49:32at the same time.
49:34Given how fast technology is
49:36and how quickly we adapt to it,
49:38I don't think we have to wait
49:40very long to find out.
49:42Microsoft Mechanics
49:44www.microsoft.com
49:46www.microsoft.com
49:48www.microsoft.com
49:50www.microsoft.com
49:52www.microsoft.com
49:54www.microsoft.com
49:56www.microsoft.com

Recomendada