Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login



sort by: page size:


See also this talk hosted by Google: https://www.youtube.com/watch?v=hic18Xyk9is

The author of this article also has a great talk in on the subject:

https://youtube.com/watch?v=IvPBMEYxP-Y


This is a talk. In case you just want the youtube link, it's here: https://www.youtube.com/watch?v=X1cgRXhpQLY

Another presentation that is in line with the thoughts of this discussion: https://www.youtube.com/watch?v=UIDb6VBO9os


I asked the same question at the end of his talk, see the relevant section in the video:

https://www.youtube.com/watch?v=fU9hR3kiOK0&t=2579


Related talk from the author: https://www.youtube.com/watch?v=Au0-HA2tm_4


Reminds me of this talk that I just watched: https://www.youtube.com/watch?v=k56wra39lwA

Interesting! I found the video: https://www.youtube.com/watch?v=O0mAQdTsVp0


Your second paragraph is very interesting and reminded me of this talk here: http://www.youtube.com/watch?v=dmzZ8lCLhlk


I think you might be interested by this talk: https://www.youtube.com/watch?v=gVBLF0ohcrE

This talk is also interesting, covering multiple approaches: https://www.youtube.com/watch?v=M2fKMP47slQ

Here's a link to the YouTube lecture just in case:

https://www.youtube.com/watch?v=Ow2ZmBmDaNo


I found this video very interesting: https://www.youtube.com/watch?v=UCroFiwllH8

next

Legal | privacy