What Teens Really Want To Know About Sex


ideas.ted.com

Remember how weird it was to ask questions about sex as a teenager? High school teacher Al Vernacchio answers his students’ questions about everything from DIY birth control to how to tell when a guy really likes you, in an excerpt from his new book.

On the first day of my Sexuality and Society class, I don’t pass around anatomy drawings. I don’t hand out pamphlets about safer sex, although those are stacked on a table near the door. Instead, the first thing I do is establish ground rules. People should speak for themselves, laughter is OK, we won’t ask “personal history” questions, and we’ll work to create a community of peers who care about and respect one another. Only then can we get to work.

I’m all about context. Talking about sexuality, intimacy, relationships, and pleasure can’t be done in a vacuum.

In the back corner of my classroom is an…

View original post 1,365 more words

Keep Your Personal Information, Personal: What The Celebrity Photo Hack Can Teach Us


Technopreneurph

You may not be Jennifer Lawrence or Kate Upton, or even know or care who those women are, but you should be aware of the latest “scandal” that included risqué photos of the pop stars and the good old cloud.

Over the Labor Day weekend, it was reported that nude photos of the high-profile celebrities Keep Your Personal Information, Personal: What The Celebrity Photo Hack Can Teach Us image selfiewere leaked online via the web forum, 4chan, by a “hacker” who was able to get into the celebrities’ personal phone storage and lift the photos from their cloud accounts. The hacker reportedly was looking to make some cash off the photos (although the identity of the hacker hasn’t been uncovered) and had made an announcement that there were more photos that would stay under wraps if he/she received PayPal donations.

Although some of these photos were said to be forgeries, representatives for Jennifer Lawrence and Mary E. Winstead confirmed their authenticity.

And so the…

View original post 367 more words

5 Lessons From The Celebrity Cloud Hack/Leak


Gigaom

With the dust starting to settle after the dreadful hacking and exposure of various female celebrities’ nude selfies, we’re finally in a position to consider the implications of what happened.

Most of this information isn’t new as such – the episode brought to the fore circumstances and activities that have been around for a while – but there are lessons in there, and it’s time we gave them serious consideration.

1. Some cloud security is unacceptably poor

[company]Apple[/company] uses two-factor authentication (2FA) as a protection for Apple ID management and iTunes and App Store purchases, but not for iCloud backups, which is where many of these pictures came from. Even where the company does employ 2FA, it doesn’t exactly make it easy. What’s more, as Nik Cubrilovic wrote in his excellent in-depth analysis of underground marketplaces and forums, Apple makes it far too easy to execute so-called brute force…

View original post 1,092 more words

The Anonymous App Used by the Police to Fight Bullies and Porn


Gigaom

In an open-floor office in the Philippines, an army of people stare at computers full of Whispers. There are 130 people to be exact, each skimming twenty posts at a time on their PC screens. They click and click and click, flagging Whispers here and there to be deleted or elevated to the company’s San Francisco team.

This is how content moderation works for the world of anonymous apps, and it all happens under the roof of one outsourcing firm called TaskUs. It’s labor intensive and it’s a massive, expensive endeavor. Whisper has used a TaskUs team in the Philippines for two years, since the company’s earliest beginnings, but now it’s not the only anonymous app doing so.

Gigaom has learned that Yik Yak, the lesser known anonymous app beloved by teens, began using TaskUs a few weeks ago and that Secretunder fire to explain how it will deal with…

View original post 983 more words