Monday, June 5, 2017

Youtube daily report Jun 5 2017

with this post production I wanted to give even more drama to the already melancholic expression of Benedetta

so I made contrast and colors more powerful

to give a more dramatic mood to the photo

Nikon D800 - Nikon 85mm f/1.4G

f/2, ISO100, 1/1250 sec.

I reframed to have the eye in the center

then I applied this new preset

created for this photo

then Photoshop

firstly I removed this plant

which was quite annoying

and a few messy hair

sharpness

dodge and burn

I evened skin tones because in some areas there was too much yellow

so I tried to even it out

these are colors actions

this one was created for this picture, Style belongs to an older video

and it was merged at 25% opacity

as last touch I removed blues from the dress

because it was white, blue shouldn't be there in the first place

of course I didn't desaturated the eye

finish

let me know your opinion in the comments!

For more infomation >> (ENG Subtitles) Mirror of my soul - Duration: 2:09.

-------------------------------------------

La Traviata "Libiamo ne lieti calici" di G. Verdi - tenore Marco Frusoni - Duration: 4:07.

For more infomation >> La Traviata "Libiamo ne lieti calici" di G. Verdi - tenore Marco Frusoni - Duration: 4:07.

-------------------------------------------

Carmen "Habanera" di G. Bizet - Valeria Sepe - Duration: 3:44.

For more infomation >> Carmen "Habanera" di G. Bizet - Valeria Sepe - Duration: 3:44.

-------------------------------------------

Trovatore "Vedi le fosche notturne" di G. Verdi - Duration: 4:20.

For more infomation >> Trovatore "Vedi le fosche notturne" di G. Verdi - Duration: 4:20.

-------------------------------------------

Madame Butterfly "Un bel di vedremo" di G. Puccini - soprano France Dariz - Duration: 5:23.

For more infomation >> Madame Butterfly "Un bel di vedremo" di G. Puccini - soprano France Dariz - Duration: 5:23.

-------------------------------------------

GnuPG Fundraising Rally - Duration: 6:09.

Hello, my name is Werner Koch.

In 1997, I started GnuPG so that

people would have a free tool

to protect their communication.

GPG has been far more successful than I imagined.

Today, activists rely on GnuPG

to coordinate their activities:

For us, GPG encryption was invaluable,

because it was one part of

a very crucial set of strategies to help

secure our communications and secure identities

as we try to do what we do best,

which is fight for democracy.

Lawyers depend on GPG

to safely speak with their colleagues and clients:

GPG is the way that I most often communicate

with people who are in need around the world.

Journalists use GPG to securely discuss stories

with their collegues and their sources:

I do strongly believe that

had we not been using GnuPG all of this time,

many of our sources and many of our journalists,

would be in danger or in jail.

GPG has even become a critical part of the Internet's infrastructure.

I would say that the majority of people

who rely on GnuPG have no idea that it's there.

In 2014, GnuPG's future looked bleak.

I even had to let go of my last employee,

and could only work on GPG part-time.

But, a last ditch donation campaign

raised 250 000 euros from individual donors.

Also, Facebook, Stripe and the Linux Foundation

committed to regular donations.

Thanks to your donations,

Werner was not only able to work on GnuPG full-time,

but he could hire five additional software developers.

Hello, from Japan!

With this team, we have been able to

not just maintain GnuPG and provide regular updates,

but actually implement some new features.

One of our main focuses has been

making GnuPG easier to use

to help fight mass surveillance.

For this, I developed a new key discovery service,

which is called the web key directory

and it makes finding someone's encryption key easier and more reliable.

I've implemented a new trust model called TOFU.

Although it doesn't provide as strong authentication as the web of trust,

its improved usability means that TOFU is

more likely to catch man-in-the-middle attacks

and phishing attempts for most users.

I have implemented a new test engine for GnuPG,

written many new tests,

and adopted and improved a set of Python bindings

for interacting with GnuPG.

And, we're moving beyond GnuPG's core.

My main job has been helping improve Enigmail,

the OpenPGP plug-in for Thunderbird.

I've set up a community platform

that makes it easy to report problems

and discuss new ideas.

I've spent a lot of time improving

GnuPG's smartcard infrastructure.

And I'm also developing a new security token called Gnuk.

Its schematics are free

so that anyone can build one.

We want to continue this work in the long term.

But, we want to do it in such a way that

our first loyalty is unambiguously to the general public.

This means that the majority of

our funding needs to come from individual donors and not corporations.

This is why we are appealing to you today.

We need you to make sure that GnuPG

which has proven to be important to so many people

is able to not only fix security problems quickly,

but also continues to improve.

A great way to ensure our long-term stability

is to make recurring donations.

Our goal is to raise 15 000 euros per month.

To do that, we hope to convince

2000 of you to commit to donating

just 5 or 10 Euros per month

the cost of 2 or 3 cups of coffee.

This money allow us to fund three developers

including supplies and travel.

With that money, we will firstly

continue to support GnuPG and its users.

And we'll write a book called

"An Advanced Introduction to GnuPG,"

which will explain how to securely use GnuPG

to digital security trainers,

programmers using GnuPG,

and, of course, enthusiasts.

If we can double that---

if 4000 of you donate just 5 to 10 euros per month---

then we will increase the size of our team

and dedicate them to help

other projects in the GnuPG community.

One project that we really want

to contribute to is GPGTools.

We want to make sure that

the Apple mailer is supported

as soon as a new version of macOS is released.

Now, maybe you don't use GPG

to encrypt your email.

Nevertheless, some journalists

whose work you value

rely on GPG to protect their sources,

and some activists fighting

for a cause that you sympathize with

rely on GPG to protect their communication,

and some lawyers speaking with their clients

rely on GPG to protect attorney-client conversations.

And, you probably interact with

many Linux-based systems everyday

at least two-thirds of the Internet

are run on Linux-based systems

and these rely on GnuPG for security.

So please, if you recognize the importance of GnuPG

even if you don't use it directly

consider donating to support our work,

and the work of so many others.

If you care about investigative journalism, support GnuPG.

It's that simple.

To me, I think it was really amazing

to be asked to be part of this process.

And, I just hope that people fund GnuPG encryption and they fund it often.

For more infomation >> GnuPG Fundraising Rally - Duration: 6:09.

-------------------------------------------

GnuPG Stories: Alex Abdo from the ACLU - Duration: 4:11.

My name is Alex Abdo and I'm a staff attorney

at the American Civil Liberties Union.

The ACLU is the oldest and biggest civil rights organization

in the United States.

We have projects ranging from classic First Amendment freedoms,

to gender equality, racial equality, equality for those in the LGBT community,

and we work a lot on privacy and surveillance.

Secure communication is fundamental for the work that I do.

We use a lot of different encryption technologies,

but probably none more important than GPG.

It allows us you know to communicate by email

with clients who otherwise wouldn't come to us,

with reporters who wouldn't communicate about the same subject

matters with us without GPG, and also fellow advocates

across the world.

I probably communicate on any given day with

about a dozen different people using GPG.

I've been surprised at how many lawyers at the ACLU

have now made GPG a part of their daily experience,

lawyers who I would not beforehand have ever thought to ask

to use a tool as sophisticated as GPG.

There's some clients who are very explicit when

they communicate with us.

They have certain expectations of confidentiality,

and they want the best technological guarantee they can get.

Actually just a couple days ago, somebody reached out to

me as a possible client using GPG and an anonymous email provider.

And I'm certain that this individual would not have contacted

us except using GPG.

And there are reporters who demand a similar sort of confidentiality,

particularly if they want to share with us a document.

Maybe a source has given them, you know leaked to them,

a very sensitive government document and they want our reaction to it.

They want us to help them understand the significance of the document.

And they wouldn't share it with us unless they could do it in a secure way.

And GPG is the default.

For some of the people we communicate with,

their main worry is the U.S. government.

For others, they're worried about leaving any sort of trace because

they may have other concerns.

You know so for example, we defend the rights of people to

speak anonymously online.

And the people who want to speak anonymously online

will take a number of measures to protect their anonymity.

You know encryption alone doesn't provide you anonymity,

but it is usually a part of the set of tools that

these people will use to communicate securely.

And so you know it's not just the U.S. government,

there are a variety of people who might be listening in

who our clients, our sources, want to evade.

GPG is the industry standard when it comes to securing your emails.

So when we have people that want to communicate with us

via email and they want to ensure that it is verifiably secure,

that's what they'll use.

You know we'll use encrypted phone services as well

which rely on public key cryptography.

That's also important to the work that we do,

but I think at the end of the day we're lawyers,

and so we're going to be exchanging documents and emails,

and the core of that is you know the security for that is GPG.

For more infomation >> GnuPG Stories: Alex Abdo from the ACLU - Duration: 4:11.

-------------------------------------------

GnuPG Stories: Andre Meister from netzpolitik.org - Duration: 6:26.

My name is Andre Meister

and I'm a journalist working at netzpolitik.org,

which is a platform for digital rights on the Internet.

At netzpolitik, we write---we report

on everything related to the Internet and the digital world.

The world where politics and the Internet come together.

At netzpolitik.org, we use encryption a lot

in many different areas---

hard dirve encryption, chat encryption,

but also GnuPG for email encryption.

Everyone---we have 100% coverage at netzpolitik.org --

everyone who works for us uses GnuPG

and when a intern comes in on the first day,

then we also help them

generate a key pair.

There are still some journalists

who, in my opinion, should encrypt everything

in particular, the major investigative journalists,

those who break the really big stories,

but they say "I'm important, I've never used encryption,

and I'm not going to start now".

In my opinion, that is completely irresponsible.

But, a lot of well-known journalists in this area

use encryption increasingly often.

In particular, Snowden's revelations significantly increased adoption.

But at least the journalists who report on the digital world,

on surveillance, and on encryption tools,

they tend to use encryption now

and if they don't do that, then they are really in the minority.

We encrypt everything that we can

in order to securely communicate with each other

as well as to offer a secure way for potential informants to contact us.

No one should have to send us an unencrypted email

when it is possible to encrypt it

and GnuPG is a relatively well-known tool for email encryption.

The main focus is that people can turn to us

and send us sensitive documents over the Internet,

even though we know that the entire digital world is completely surveyed,

even though we know from Snowden, from intelligence agency surveillance,

even though we report on exactly that

and even though our telephones were tapped

and our Internet connection,

confidentiality is truly one of the strong criteria.

netzpolitik.org was investigated for treason by the federal attorney general.

Officially, there were only inquiries

regarding banking transactions,

and at the resident registration offices.

Officially, the police didn't conduct

any telecommunication surveillance.

There was a possibility that we would have to go to jail for several years,

because we did our work

and, as journalists, reported

what the intelligence agencies do.

Just this work---

the publication of documents classified as secret---would have been enough.

But then they considered the content of our stories.

We reported on surveillance by intelligence agencies,

and we were very careful to consider: what exactly are prosecuring authorities,

and intelligence agencies allow to do?

My and Markus' investigation for treason

was then, after 2 years, or a year and a half,

relatively quickly dismissed.

We haven't stopped doing our work.

And since then we have published more classified documents

about the national security agency

and the BND [german intelligence agency].

We will continue to do this work

but we have now seen

that it can lead to an investigation against us.

and we shouldn't---we can't be naive

and think "oh, nothing is going to happen this time

"last time everything worked out okay."

No, we need to be prepared for any possible consequences,

when we are surveyed, when our telecommunications are intercepted,

even when we are threaten with criminal prosecution.

But that is not only our responsibility to us,

but also our responsibility to our sources.

As journalists, it is our job

to protect communication with our sources.

We have to protect our sources.

That's why it is self-evident, that we offer encrypted communication,

even when not all of our sources take advantage of it,

but that is a story for another day.

We are now in the unusual position

that we have a concrete adversary---the state.

But, we have always encrypted our email.

Even before Snowden, even before being surveyed,

we used GnuPG and other encryption tools,

simply because we know how insecure unencrypted email is,

because it is not only about the national criminal intelligence service

or the federal attorney general,

but it is also about a hacked router, a neighbor using the WiFi, an insecure password,

a mail provider somewhere that has a security hole.

The Internet is not a walk in the park,

sooner or later, control over data is lost

and if it is only control over encrypted data,

then it is not so bad.

But everyday, we read about new leaks

how millions of pieces of data are somehow exposed.

Encryption and GnuPG are a possibility

to keep communication and other data private

and we used it long before Snowden

and long before the treason case

and we will continue to encrypt.

It is simply---we can't be naive about the Internet

---what we send unencrypted

will most certainly be seen by unintended recipients.

It is only when we protect ourselves with digital tools

that we can actually keep confidential information confidential.

And the tools are there,

tools like GnuPG exist, and we should finally just use them.

For more infomation >> GnuPG Stories: Andre Meister from netzpolitik.org - Duration: 6:26.

-------------------------------------------

GnuPG Stories: Benjamin Ismaïl from Reporters without Borders - Duration: 4:52.

Hello, my name is Benjamin Ismaïl.

I'm responsible for the Asia-Pacific office at Reports without Borders.

Reporters without borders is an international organization

which defends freedom of information

and freedom of the press worldwide.

Our head office is in Paris

and we have another dozen offices in Europe and in the United States.

We have a worldwide network of journalists.

There are about 150 journalists in equally many countries

who everyday send us information

by email, by phone

by whatever communication means available

and who help us verify the information on the ground

and who also carry our voice

in our pleas to the authorities.

We primarily use GPG

to freely communicate with our sources.

The information they give us

about human rights and the violations that they are subjected to

are sensitive information,

and it is necessary for them to protect their conversations

with Reporters Without Borders.

In some cases, the mere fact of being in contact with our organization

may be a sufficient reason for the authorities to arrest someone

or to harass them

in the most repressive countries.

In some cases, we speak with journalists

who already have PGP keys

and use the technology.

It nevertheless happens that

the journalists with whom we want to speak

don't know how to use this technology.

We then try to train them,

either by sitting down with them ourselves

or through a partner---a representative---who goes there

and who teaches the journalists this technology,

who helps them install the software

and helps them to create a key.

And if we have to do it remotely

then we use encrypted communication---encrypted chat.

I think that bloggers, cyber activists

and human rights activists

in the most repressive regimes

greatly appreciate online security technologies

those that enable them to bypass

censorship measures put in place by the authorities,

or those that enable them to protect their conversations,

such as GPG encryption,

because on a near daily basis they see

colleagues and friends who are arrested

and face unfair trials

by a court system that is not independent,

and be imprisoned for years for merely wanting to

defend and improve human rights.

And when they are witnesses--- when they experience this---

they can't help but take their security seriously.

I have other examples of conversations with bloggers from South-East Asia

who after a digital security training

started to use OpenPGP to communicate with us,

but then suddenly stopped using it

and returned to sending unencrypted email.

We responded to them, that we can't keep communicating with you

if you don't use OpenPGP, because you are putting yourselves in danger.

We had contact with some people in China---

human right defenders---

but unfortunately one morning we learned

that a person was stopped by the authorities

and questioned for many hours.

During that time, we didn't get any news about him.

I think it's only after three days,

that the person was released from detention

and revealed that the police showed him

some documents from his computer---

some of his email conversations---

and they tried to incriminate him based on these documents.

But, the person also told us

that the authorities hadn't shown him any documents linked to Reports without Borders,

precisely because these documents had been encrypted with GPG.

For more infomation >> GnuPG Stories: Benjamin Ismaïl from Reporters without Borders - Duration: 4:52.

-------------------------------------------

J-1 : Campagne de sociofinancement - Duration: 0:57.

For more infomation >> J-1 : Campagne de sociofinancement - Duration: 0:57.

-------------------------------------------

Is Sugar Alcohol as Awesome as It Sounds? - Duration: 3:33.

If you made a list of all the substances that you most like to ingest,

what would be on it?

Would sugar be on that list?

Of course it would.

Because sugar's delicious.

And how about alcohol?

If you're old enough to drink it, alcohol can be pretty OK,

although it can turn on you pretty quickly.

But if you've looked at a nutrition label lately, you've probably noticed that there's

an ingredient showing up in a lot of foods that seem to combine these two: sugar alcohol.

It's a common ingredient in many processed foods.

It's used as a low-calorie sweetener in everything from soft drinks to snack bars,

and there are lots of different kinds, like erythritol, xylitol, or sorbitol.

But, what is it?

Is it sugar?

Or is it alcohol?

Is it the sugar that's in alcohol?

And if I see it on a nutrition label, does that mean

that there's booze in my protein bar or diet cola?

No!

Sugar alcohol actually starts out as sugar,

but then it's fermented to create a kind of alcohol.

But not the kind that you're probably thinking of.

Whenever you hear people talking about "alcohol", like 99.99 percent of the time, what they're

talking about is ethanol, also known as ethyl alcohol.

But ethanol is just one of many kinds of alcohol.

Technically speaking, an alcohol is any compound that contains a hydrogen-oxygen pair,

known as a hydroxyl group, that's bound to an atom of carbon that's saturated, meaning

all of its electrons are bound to something else.

And that's it!

That describes all kinds of chemical compounds,

most of which you'd never want to put in your body.

Like ethylene glycol, the stuff that's in antifreeze?

That's an alcohol.

And so is 2-propanol, aka isopropyl or rubbing alcohol.

Substances like these aren't intoxicating, they're just poisonous, usually because

your body metabolizes them into some horrible, dangerous compound

like formic acid or oxalic acid.

So how do you take sugar and turn it into an alcohol, one that won't kill you?

Well, most sugar alcohol, like erythritol, for example, is made from corn.

The corn is boiled, mashed and broken down into its basic sugar, glucose.

Then, it's fed to a bunch of fungus.

Yeasts, to be precise.

Because, sugar alcohol is the product of fermentation, just like the alcohol in beer or wine.

To make sugar alcohols specifically, companies use certain kinds of yeast that turn glucose

into sweet, non-toxic alcohols.

These yeasts eat away at the glucose, breaking down those big, clunky sugar molecules into

smaller, simpler molecules.

And what's left are molecules with four carbons, each of which is saturated,

and attached to a hydroxyl group.

And there you have it.

Sugar.

Alcohol.

It doesn't have the intoxicating effects of ethanol, and thankfully it also doesn't

have the killing-you effects of other alcohols, because your body doesn't break it down

into anything deadly.

But it does taste sweet, because like glucose,

it bonds with the sweetness receptors on your tongue.

And at the same time, it contains fewer calories than a molecule of glucose.

Now that's because most sugar alcohols pass through your body

without being metabolized all the way.

In some cases, they're not broken down at all.

Erythritol, for example, is absorbed as a whole molecule right there in your small intestine.

It's never broken apart, so the energy in its bonds is never released.

Which means it contains zero calories!

Sugar alcohols do have their downsides, though.

Erythritol is excreted mostly through your urine, you just pee it out.

But other kinds of sugar alcohols make it all the way through your intestines without

being completely absorbed, and have to come out as the other kind of waste.

Which is why foods that contain alcohols like sorbitol and mannitol warn you on their labels

that they may create a "laxative effect."

Which, I dunno, could be worse, I guess?

So maybe you can have your cake and eat it too.

It just might give you a little diarrhea.

Thanks for watching this episode of SciShow,

which was brought to you by our patrons on Patreon.

If you want to help us support this show, you can go to patreon.com/scishow.

And don't forget to go to youtube.com/scishow and subscribe!

For more infomation >> Is Sugar Alcohol as Awesome as It Sounds? - Duration: 3:33.

-------------------------------------------

the deed is done - Duration: 1:13.

Hello

7:32 pm

June 5th, Monday.

I understand it.

goodbye old friend.

oh thats goin ham O-O

I was expecting this

He's a fighter

But I've got more than one weapon

you won't get away that easily

The deed is done

No comments:

Post a Comment