BLOGS
Irongeek
http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-c-02-data-access-rights-exploits-under-new-privacy-laws-amber-welch
http://code.google.com/apis/ajaxsearch/faq.html
https://www.irongeek.com/i.php?page=videos/bsidescleveland2015/bl09-augmenting-mobile-security-and-privacy-controls-brian-krupp-briankrupp
http://www.irongeek.com/i.php?page=videos/circlecitycon2019/main-track-1-2-00-data-access-rights-exploits-under-new-privacy-laws-amber-welch
http://www.irongeek.com/i.php?page=videos/derbycon7/t419-winning-and-quitting-the-privacy-game-what-it-really-takes-to-have-true-privacy-in-the-21st-century-or-how-i-learned-to-give-in-and-embrace-exif-tags-tim-malcomvetter
http://www.irongeek.com/i.php?page=videos/showmecon2016/ba04-championing-a-culture-of-privacy-from-ambivalence-to-buy-in-hudson-harris
https://www.irongeek.com/i.php?page=videos/derbycon4/t308-ethical-control-ethics-and-privacy-in-a-target-rich-environment-kevin-johnson-and-james-jardine
https://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-110-privacy-for-safety-how-can-we-help-vulnerable-groups-with-privacy-stella
https://www.irongeek.com/i.php?page=videos/cyphercon2016/cyphercon11-pissed-privacy-in-a-surveillance-state-evading-detection-joe-cicero
http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/a02-using-technology-to-defend-digital-privacy-human-rights-tom-eston
http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-06-training-and-education-for-the-new-realities-of-privacy-and-security-mitchell-parker