CHINA DECRYPTING iCLOUD
"Apple has been caving to Beijing’s demands, to the extent of compromising the security of its users’ data, according to a report on The New York Times. The report contradicts
EBAY LISTINGS
"... In a move that observers fear may represent a setback for fair moderation of product listings – and of content in general – ecommerce giant eBay has announced that it is p
UK SURVEILLANCE
"The UK intelligence agency GCHQ (Government Communications Headquarters) violated the freedom to privacy through its mass interception of online communications, ruled the grand ch
APP-LAYER DATA ENCRYPTION
"Application-layer encryption, however, enhances the protection of data at rest because the data is encrypted by the application using it. So, encryption/decryption keys are only a
DATA GOLDMINE
"Instead, over the past six years, there has been a steady and entirely predictable rise in requests for detailed personal data that Big Tech collects from users and their devices.
Twitter agrees to censor for India
"Twitter has started taking steps to fully comply with new internet rules now being enforced in India, despite the fact that those are criticized as detrimental to free expression
CONTROLLING TRANSACTIONS THROUGH MOBILE APPS
"Private control of blockchain transactions through mobile applications is becoming the latest fad in the world of digital currency. The main reason why this is so is that it bring
Twitch plays internet police
Distributed ledger technologies (DLT) require a peer-to-peer network and so-called consensus algorithms to ensure that data is replicated across all nodes...
FB 2021 DATA LEAK
Distributed ledger technologies (DLT) require a peer-to-peer network and so-called consensus algorithms to ensure that data is replicated across all nodes...
What is zero trust?
A zero-trust model is a security framework that fortifies the enterprise by removing implicit trust...