6 private links
By Lo Shih-hung The US-based global tech giant Apple Inc. is set to hand over the operation of its iCloud data center in mainland China to a local corporation called Guizhou-Cloud Big Data (GCBD) by February 28, 2018. When this transition happens, the local company will become responsible for handling …
TRIBUNE. Nous avons passé malgré nous un pacte entre d’un côté le confort procuré et de l’autre la liberté abandonnée. L’enjeu deviendra démocratique s’il ne l’est pas déjà.
CSS-Keylogging - Chrome extension and Express server that exploits keylogging abilities of CSS.
As smarter vehicles become troves of personal information, get ready for coupon offers at the next stoplight.
Baby monitors serve an important purpose in securing and monitoring our loved ones. An estimated 52k user accounts and video baby monitors are affected by a
La Commission satisfaite des efforts de Google
Des astreintes jusqu'à 100 millions d'euros
35.000 personnes touchées par la faille
"I don't want to live in a world where younger generations grow up without privacy."
Google's going to weave AI into every part of the company.
The new approach could one day allow people to screen themselves for the risks that could lead to heart disease.
Monitoring tech pioneered in the region is spreading across China and the world.
Facebook’s (much deserved) media nightmare continued this week when it came under criticism for spamming members who signed up for two-factor authentication. This was followed by charges that its P…
Google sécurise enfin l'appareil photo et le micro
Des experts tirent la sonnette d'alarme
Et c'est un peu grâce à Facebook
Last August, I launched a little feature within Have I Been Pwned (HIBP) I called Pwned Passwords. This was a list of 320 million passwords from a range of different data breaches which organisations could use to better protect their own systems. How? NIST explains: When processing requests to establish
Long before we knew that it would be called Signal, we knew what we wanted it to be. Instead of teaching the rest of the world cryptography, we wanted to see if we could develop cryptography that worked for the rest of the world. At the time, the industry consensus was largely that encryption and cryptography would remain unusable, but we started Signal with the idea that private communication could be simple. Since then, we’ve made some progress. We’ve built a service used by millions, and software used by billions. The stories that make it back to us and keep us going are the stories of people discovering each other in moments where they found they could speak freely over Signal, of people falling in love over Signal, of people organizing ambitious plans over Signal. When we ask friends who at their workplace is on Signal and they respond “every C-level executive, and the kitchen staff.” When we receive a subpoena for user data and have nothing to send back but a blank sheet of paper. When we catch that glimpse of “Signal blue” on a metro commuter’s phone and smile.
« Tout ce que vous dites ou faites peut être et sera utilisé contre vous, n’importe quand dans un avenir lointain, lorsque le contexte et l’acceptabilité de ce que vous dites ou faites auront radicalement changé. » Avec la surveillance analogique de nos parents, tout était capté dans le contexte de son temps. La surveillance numérique de nos enfants conserve tout pour un usage futur contre eux.